id
stringlengths
12
19
title
stringlengths
0
237
description
stringlengths
35
3.87k
patches
listlengths
1
22
cwe
stringlengths
2
440
CVE-2024-11171
Improper Input Validation in danny-avila/librechat
In danny-avila/librechat version git 0c2a583, there is an improper input validation vulnerability. The application uses multer middleware for handling multipart file uploads. When using in-memory storage (the default setting for multer), there is no limit on the upload file size. This can lead to a server crash due to out-of-memory errors when handling large files. An attacker without any privileges can exploit this vulnerability to cause a complete denial of service. The issue is fixed in version 0.7.6.
[ { "commit_message": "[PATCH] fix: refactor avatar upload handling to use fs for file reading and enhance file validation api/server/routes/files/avatar.js | 9 +++++---- api/server/services/Files/process.js | 18 ++++++++++++------ 2 files changed, 17 insertions(+), 10 deletions(-)", "patch_text_b64": "Rn...
CWE-770 Allocation of Resources Without Limits or Throttling
CVE-2024-24811
Products.SQLAlchemyDA vulnerable to unauthenticated arbitrary SQL query execution
SQLAlchemyDA is a generic database adapter for ZSQL methods. A vulnerability found in versions prior to 2.2 allows unauthenticated execution of arbitrary SQL statements on the database to which the SQLAlchemyDA instance is connected. All users are affected. The problem has been patched in version 2.2. There is no workaround for the problem.
[ { "commit_message": "[PATCH] - Add missing security declarations on the database adapter class CHANGES.rst | 3 +++ src/Products/SQLAlchemyDA/da.py | 3 +++ 2 files changed, 6 insertions(+)", "patch_text_b64": "RnJvbSA3MTY1YjFhZTRhZDQ4MTMyMDk2ZTI2MDlkYjcwMjRhZWI4ZDQ0MzA1IE1vbiBTZXAgMTcgMDA...
CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
GHSA-v6qv-c78w-ff25
null
[ { "commit_message": "[PATCH] ci: add llvm dependencies Signed-off-by: Ettore Di Giacinto <mudler@users.noreply.github.com> Dockerfile | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBkMDJhMGY2ZjAxZDVjNGE5MjZhMmQ2NzE5MGNiNTVkN2FjYTIzYjY2IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9t...
null
GHSA-h2fp-7rxc-44gq
null
[ { "commit_message": "[PATCH] nfs: always make sure page is up-to-date before extending a write to cover the entire page MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit We should always make sure the cached page is up-to-date when we're determining whether we can extend ...
null
CVE-2022-4585
Opencaching Deutschland oc-server3 Cookie start.tpl cross site scripting
A vulnerability classified as problematic has been found in Opencaching Deutschland oc-server3. This affects an unknown part of the file htdocs/templates2/ocstyle/start.tpl of the component Cookie Handler. The manipulation of the argument usercountryCode leads to cross site scripting. It is possible to initiate the attack remotely. The name of the patch is c720f2777a452186c67ef30db3679dd409556544. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216171.
[ { "commit_message": "[PATCH] Fix XSS on home page (OBB-602216) Do not store totaly invalid countries in cookie in the first place htdocs/lib2/common.inc.php | 2 +- htdocs/templates2/ocstyle/start.tpl | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBjNzIwZjI3NzdhND...
CWE-707 Improper Neutralization -> CWE-74 Injection -> CWE-79 Cross Site Scripting
GHSA-3f84-rpwh-47g6
Waitress vulnerable to DoS leading to high CPU usage/resource exhaustion
null
[ { "commit_message": "[PATCH 1/6] HTTPChannel is always created from accept, explicitly set self.connected to True src/waitress/channel.py | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-)", "patch_text_b64": "RnJvbSAwM2NjNjQwZmU3MTA2OTAyODk5ZjgyMTE1YzI2ZTM3MDAyYmNhN2YxIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQ...
null
GHSA-rr76-fj9v-7w82
null
[ { "commit_message": "[PATCH] io_uring: COW io_identity on mismatch If the io_identity doesn't completely match the task, then create a copy of it and use that. The existing copy remains valid until the last user of it has gone away. This also changes the personality lookup to be indexed by io_identity, instead ...
null
GHSA-q73m-3q7r-fpf7
Cross-site Scripting in ShowDoc
null
[ { "commit_message": "[PATCH] Update AttachmentModel.class.php server/Application/Api/Model/AttachmentModel.class.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBhYTQxYzgzZTBjYzUwNzlmYjM5ZTA0ZDlmNjMwNTcxZmZiOGJiZjIyIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBamF5c2VuIFIgP...
null
GHSA-x9vc-5q77-m7x4
Improper Input Validation in pyload-ng
null
[ { "commit_message": "[PATCH] validate time config values src/pyload/core/config/parser.py | 23 ++++++++++++++++++++--- 1 file changed, 20 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSBhMmIxZWIxMDI4ZjQ1YWM1OGRlYTVmNTg1OTNjMWQzZGIyYjRhMTA0IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBHYW1tYUMwZGUgPGd...
null
GHSA-q8h9-pqcx-59hw
Apache Airflow exposes arbitrary file content
null
[ { "commit_message": "[PATCH] Configurable umask to all deamonized processes. (#25664) We previously had this for just the `celery worker` subcommand, this PR extends it to anything that can run in daemon mode (cherry picked from commit bf14d14e272d24ee7a3f798c242593078359383e) airflow/cli/cli_parser.py ...
null
GHSA-x377-f64p-hf5j
PyCrypto does not properly reseed PRNG before allowing access
null
[ { "commit_message": "[PATCH] Random: Make Crypto.Random.atfork() set last_reseed=None (CVE-2013-1445) == Summary == In PyCrypto before v2.6.1, the Crypto.Random pseudo-random number generator (PRNG) exhibits a race condition that may cause it to generate the same 'random' output in multiple processes that are f...
null
GHSA-w799-rf9r-4rqc
null
[ { "commit_message": "[PATCH] SECURITY: Fix DoS on overly long input from Postfix MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Thanks to Mateusz Jończyk who reported this issue and gave valuable feedback for its resolution. PostSRSd would hang on an overly long GET re...
null
CVE-2025-66405
Portkey.ai Gateway: Server-Side Request Forgery (SSRF) in Custom Host
Portkey.ai Gateway is a blazing fast AI Gateway with integrated guardrails. Prior to 1.14.0, the gateway determined the destination baseURL by prioritizing the value in the x-portkey-custom-host request header. The proxy route then appends the client-specified path to perform an external fetch. This can be maliciously used by users for SSRF attacks. This vulnerability is fixed in 1.14.0.
[ { "commit_message": "[PATCH 1/7] fix: custom host validator to protect from ssrf attack src/middlewares/requestValidator/index.ts | 135 +++++++++++++++++++++- 1 file changed, 134 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBjMTcxZDgzZGVjY2RjMmM4YjNhZDE1YmRiYzYwNzJkZGFkOGQ5ZDg4IE1vbiBTZXAgMTcgMDA...
CWE-918: Server-Side Request Forgery (SSRF)
GHSA-mw67-65x5-h28p
null
[ { "commit_message": "[PATCH] ksmbd: check nt_len to be at least CIFS_ENCPWD_SIZE in ksmbd_decode_ntlmssp_auth_blob MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit \"nt_len - CIFS_ENCPWD_SIZE\" is passed directly from ksmbd_decode_ntlmssp_auth_blob to ksmbd_auth_ntlmv2. ...
null
CVE-2021-20286
A flaw was found in libnbd 1.7.3. An assertion failure in nbd_unlocked_opt_go in ilb/opt.c may lead to denial of service.
[ { "commit_message": "[PATCH] opt_go: Tolerate unplanned server death While debugging some experimental nbdkit code that was triggering an assertion failure in nbdkit, I noticed a secondary failure of nbdsh also dying from an assertion: libnbd: debug: nbdsh: nbd_opt_go: transition: NEWSTYLE.OPT_GO.SEND -> DEAD l...
CWE-617
GHSA-6898-wx94-8jq8
Potential Command Injection in libnotify
null
[ { "commit_message": "[PATCH] Replacing call to exec with execFile. lib/libnotify.js | 9 ++++----- 1 file changed, 4 insertions(+), 5 deletions(-)", "patch_text_b64": "RnJvbSA4ZTJlNzMwNjA4ODYyNDUwM2JhNWVlYzU5MmI1MDJjNGY5N2Q4ODQ2IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBOZWFsIFBvb2xlIDxuZWFsQGNzLmJyb3duLmVkd...
null
CVE-2021-38160
In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size. NOTE: the vendor indicates that the cited data corruption is not a vulnerability in any existing use case; the length validation was added solely for robustness in the face of anomalous host OS behavior
[ { "commit_message": "[PATCH] virtio_console: Assure used length from device is limited The buf->len might come from an untrusted device. This ensures the value would not exceed the size of the buffer to avoid data corruption or loss. Signed-off-by: Xie Yongji <xieyongji@bytedance.com> Acked-by: Jason Wang <jaso...
n/a
GHSA-xcvw-hh99-qm73
Liferay Portal is vulnerable to XSS through its workflow process builder
null
[ { "commit_message": "[PATCH] LPD-15212 Check the workflow XML file for malicious content .../source-builder/SourceBuilder.js | 25 ++++++++++++++++++- .../source-builder/xmlUtil.js | 16 ++++++++++++ 2 files changed, 40 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAzYWNhZD...
null
GHSA-4r62-v4vq-hr96
Regular Expression Denial of Service (REDoS) in Marked
null
[ { "commit_message": "[PATCH] fix: Total rework of Emphasis/Strong (#1864) BREAKING CHANGE: `em` and `strong` tokenizers have been merged into one `emStrong` tokenizer lib/marked.esm.js | 164 ++++++++---------- lib/marked.js | 153 ++++++++-------- marke...
null
CVE-2025-54798
tmp does not restrict arbitrary temporary file / directory write via symbolic link `dir` parameter
tmp is a temporary file and directory creator for node.js. In versions 0.2.3 and below, tmp is vulnerable to an arbitrary temporary file / directory write via symbolic link dir parameter. This is fixed in version 0.2.4.
[ { "commit_message": "[PATCH] Fix GHSA-52f5-9888-hmc6 lib/tmp.js | 326 +++++++++++++++++++++++++++++++---------------------- 1 file changed, 192 insertions(+), 134 deletions(-)", "patch_text_b64": "RnJvbSAxODhiMjVlNTI5NDk2ZTM3YWRhZjFhMWQ5ZGNjYjQwMDE5YTA4YjFiIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiA9P1VURi0...
CWE-59: Improper Link Resolution Before File Access ('Link Following')
CVE-2011-2929
The template selection functionality in actionpack/lib/action_view/template/resolver.rb in Ruby on Rails 3.0.x before 3.0.10 and 3.1.x before 3.1.0.rc6 does not properly handle glob characters, which allows remote attackers to render arbitrary views via a crafted URL, related to a "filter skipping vulnerability."
[ { "commit_message": "[PATCH] Properly escape glob characters. actionpack/lib/action_view/template/resolver.rb | 15 ++++++++++++--- actionpack/test/controller/render_test.rb | 14 ++++++++++++++ actionpack/test/fixtures/test/hello_w*rld.erb | 1 + 3 files changed, 27 insertions(+), 3 deletions(-) create m...
n/a
CVE-2021-32607
An issue was discovered in Smartstore (aka SmartStoreNET) through 4.1.1. Views/PrivateMessages/View.cshtml does not call HtmlUtils.SanitizeHtml on a private message.
[ { "commit_message": "[PATCH] Fixed text issue in private messages of forum .../SmartStore.Web/Views/PrivateMessages/View.cshtml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA1YjRlNjBhZTcxMjRkZjA4OTg5NzVjYjhmOTk0ZjlmMjNkYjFmYWUzIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQ...
n/a
GHSA-rgmp-4873-r683
Pterodactyl TOTPs can be reused during validity window
null
[ { "commit_message": "[PATCH] Ensure that TOTP tokens cannot be reused (#5481) .../Auth/LoginCheckpointController.php | 19 +- app/Services/Users/ToggleTwoFactorService.php | 2 +- database/Factories/UserFactory.php | 11 +- .../Auth/LoginCheckpointControllerTest.php | 207 +++++++++++++++++...
null
CVE-2020-9432
openssl_x509_check_host in lua-openssl 0.7.7-1 mishandles X.509 certificate validation because it uses lua_pushboolean for certain non-boolean return values.
[ { "commit_message": "[PATCH] fix security: GSL-2020-026 src/x509.c | 120 +++++++++++++++++++++++++++++++++++++++-------------- 1 file changed, 88 insertions(+), 32 deletions(-)", "patch_text_b64": "RnJvbSBhNmRjMTg2ZGQ0YjZiOWUzMjlhOTNjY2EzZTdlM2NmY2NmZGYzY2NhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiB6aGFvem...
n/a
GHSA-4gmg-gwjh-3mmr
phpMyAdmin Cryptographic Vulnerability
null
[ { "commit_message": "[PATCH] Use full alphabet to generate random passwords MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Signed-off-by: Michal Čihař <michal@cihar.com> js/functions.js | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvb...
null
GHSA-2c2h-2855-mf97
Apache Camel: Camel Message Header Injection via Improper Filtering
null
[ { "commit_message": "[PATCH] CAMEL-21828: Fix DefaultHeaderFilterStrategy when filtering in lower-case mode. (#17351) .../http/PlatformHttpCamelHeadersTest.java | 60 +++++++++++++++++++ .../impl/DefaultHeaderFilterStrategyTest.java | 22 +++++++ .../support/DefaultHeaderFilterStrategy.java | 32 +++++++--- 3 ...
null
GHSA-wpvx-26f7-65q3
Mayan EDMS multiple cross-site scripting (XSS) vulnerabilities
null
[ { "commit_message": "[PATCH] Remove the striptags functionality, fixes some instances of XSS, issue #3 .../templates/calculate_form_title.html | 12 +++---- apps/common/templates/generic_detail.html | 28 +++++++-------- apps/common/templates/generic_form.html | 8 ++--- apps/common/templates/gene...
null
GHSA-wxr5-93ph-8wr9
Apache Commons Improper Access Control vulnerability
null
[ { "commit_message": "[PATCH] Add org.apache.commons.beanutils.SuppressPropertiesBeanIntrospector.SUPPRESS_DECLARING_CLASS src/changes/changes.xml | 16 +++ .../commons/beanutils2/PropertyUtilsBean.java | 1 + .../SuppressPropertiesBeanIntrospector.java | 14 ++- .../apache/commons/beanu...
null
CVE-2022-2849
Heap-based Buffer Overflow in vim/vim
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0220.
[ { "commit_message": "[PATCH] patch 9.0.0220: invalid memory access with for loop over NULL string Problem: Invalid memory access with for loop over NULL string. Solution: Make sure mb_ptr2len() consistently returns zero for NUL. src/globals.h | 3 ++- src/mbyte.c | 21 ...
CWE-122 Heap-based Buffer Overflow
CVE-2018-7480
The blkcg_init_queue function in block/blk-cgroup.c in the Linux kernel before 4.11 allows local users to cause a denial of service (double free) or possibly have unspecified other impact by triggering a creation failure.
[ { "commit_message": "[PATCH] blkcg: fix double free of new_blkg in blkcg_init_queue If blkg_create fails, new_blkg passed as an argument will be freed by blkg_create, so there is no need to free it again. Signed-off-by: Hou Tao <houtao1@huawei.com> Signed-off-by: Jens Axboe <axboe@fb.com> block/blk-cgroup.c | 4...
n/a
GHSA-273c-54fq-2595
null
[ { "commit_message": "[PATCH] update return type for settigns server/controllers/settingsController.js | 17 +++++++++++++++-- 1 file changed, 15 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSAzNmQ3OGE5YWE0ZWQ2MDdjYTFiZDJiNWZkYWNhNWEzOTI3YjJkMjg3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBbGV4IEhvb...
null
CVE-2019-11487
The Linux kernel before 5.1-rc5 allows page->_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests.
[ { "commit_message": "[PATCH 1/4] mm: make page ref count overflow check tighter and more explicit We have a VM_BUG_ON() to check that the page reference count doesn't underflow (or get close to overflow) by checking the sign of the count. That's all fine, but we actually want to allow people to use a \"get page...
n/a
CVE-2025-46570
vLLM’s Chunk-Based Prefix Caching Vulnerable to Potential Timing Side-Channel
vLLM is an inference and serving engine for large language models (LLMs). Prior to version 0.9.0, when a new prompt is processed, if the PageAttention mechanism finds a matching prefix chunk, the prefill process speeds up, which is reflected in the TTFT (Time to First Token). These timing differences caused by matching chunks are significant enough to be recognized and exploited. This issue has been patched in version 0.9.0.
[ { "commit_message": "[PATCH] [Core] Prevent side-channel attacks via cache salting (#17045) Signed-off-by: Marko Rosenmueller <5467316+dr75@users.noreply.github.com> docs/source/design/v1/prefix_caching.md | 20 +- tests/entrypoints/openai/test_serving_chat.py | 40 ++++ tests/tokenization/test_detokenize...
CWE-208: Observable Timing Discrepancy
CVE-2024-32020
Cloning local Git repository by untrusted user allows the untrusted user to modify objects in the cloned repository at will
Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, local clones may end up hardlinking files into the target repository's object database when source and target repository reside on the same disk. If the source repository is owned by a different user, then those hardlinked files may be rewritten at any point in time by the untrusted user. Cloning local repositories will cause Git to either copy or hardlink files of the source repository into the target repository. This significantly speeds up such local clones compared to doing a "proper" clone and saves both disk space and compute time. When cloning a repository located on the same disk that is owned by a different user than the current user we also end up creating such hardlinks. These files will continue to be owned and controlled by the potentially-untrusted user and can be rewritten by them at will in the future. The problem has been patched in versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4.
[ { "commit_message": "[PATCH] builtin/clone: refuse local clones of unsafe repositories When performing a local clone of a repository we end up either copying or hardlinking the source repository into the target repository. This is significantly more performant than if we were to use git-upload-pack(1) and git-f...
CWE-281: Improper Preservation of Permissions
CVE-2025-48063
XWiki Platform Security Authorization Bridge allows users with just edit right can enforce required rights with programming right
XWiki is a generic wiki platform. In XWiki 16.10.0, required rights were introduced as a way to limit which rights a document can have. Part of the security model of required rights is that a user who doesn't have a right also cannot define that right as required right. That way, users who are editing documents on which required rights are enforced can be sure that they're not giving a right to a script or object that it didn't have before. A bug in the implementation of the enforcement of this rule means that in fact, it was possible for any user with edit right on a document to set programming right as required right. If then a user with programming right edited that document, the content of that document would gain programming right, allowing remote code execution. This thereby defeats most of the security benefits of required rights. As XWiki still performs the required rights analysis when a user edits a page even when required rights are enforced, the user with programming right would still be warned about the dangerous content unless the attacker managed to bypass this check. Note also that none of the affected versions include a UI for enabling the enforcing of required rights so it seems unlikely that anybody relied on them for security in the affected versions. As this vulnerability provides no additional attack surface unless all documents in the wiki enforce required rights, we consider the impact of this attack to be low even though gaining programming right could have a high impact. This vulnerability has been patched in XWiki 16.10.4 and 17.1.0RC1. No known workarounds are available except for upgrading.
[ { "commit_message": "[PATCH] XWIKI-22859: RightsFilterListener error when required right scope is null * Fix a null pointer exception in RightsFilterListener which was triggered when the scope of the required right is null. * Add a unit test covering this case. .../internal/RightsFilterListener.java | 2...
CWE-285: Improper Authorization
CVE-2022-0502
Cross-site Scripting (XSS) - Stored in livehelperchat/livehelperchat
Cross-site Scripting (XSS) - Stored in Packagist remdex/livehelperchat prior to 3.93v.
[ { "commit_message": "[PATCH] Canned messages fixes .../design/defaulttheme/tpl/lhchat/cannedmsgform.tpl.php | 2 +- .../defaulttheme/tpl/lhuser/parts/canned_messages.tpl.php | 6 +++--- 2 files changed, 4 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSBkM2IxMDdhYWE4ZWMxMDgxNmFjYzc2MmQ2MGU3MzIxM...
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-p5v3-7243-m33v
null
[ { "commit_message": "[PATCH] encode: protect from stack under-flow From GH #178 fuzzing src/bits.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBiODRjMmNhYjU1OTQ4YTVlZTcwODYwNzc5YjI2NDA5MTNlM2VlMWVkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBSZWluaSBVcmJhbiA8cnVyYmFuQGNwYW4...
null
GHSA-5wvp-7f3h-6wmm
PyArrow: Arbitrary code execution when loading a malicious data file
null
[ { "commit_message": "[PATCH] GH-38607: [Python] Disable PyExtensionType autoload (#38608) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit ### Rationale for this change PyExtensionType autoload is really a misfeature. It creates PyArrow-specific extension types, though u...
null
GHSA-69h6-vqxf-rc54
null
[ { "commit_message": "[PATCH] Clean up pkg filter text before use. Fixes #12725 Also remove unnecessary echos of the value. src/usr/local/www/pkg.php | 9 +++------ 1 file changed, 3 insertions(+), 6 deletions(-)", "patch_text_b64": "RnJvbSA1ZDgyY2NlMGQ2MTVhNzZiNzM4Nzk4NTc3YTI4YTE1ODAzZTU5YWViIE1vbiBTZXAgMTcg...
null
GHSA-v9cx-qp5g-qchc
null
[ { "commit_message": "[PATCH] Treat absolute paths as relative paths during extraction Tell libarchive to use the path for extraction that Ark uses internally. In addition, set the ARCHIVE_EXTRACT_SECURE_NOABSOLUTEPATHS flag to avoid that absolute paths are used by accident. (cherry picked from commit cc9ea9e89c...
null
GHSA-phjp-gxh4-rcjp
null
[ { "commit_message": "[PATCH] Add CSRF Token to Clear Table Upload/admin/modules/home/index.php | 204 ++++++++++++++-------------- 1 file changed, 102 insertions(+), 102 deletions(-)", "patch_text_b64": "RnJvbSAzZGVhZTcwMWNkZDg5NzUzY2I2Njg4MzAyYWVlNWI5M2E3MmJjNThiIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiAwe...
null
CVE-2017-20182
Mobile Vikings Django AJAX Utilities Backslash pagination.js Pagination cross site scripting
A vulnerability was found in Mobile Vikings Django AJAX Utilities up to 1.2.1 and classified as problematic. This issue affects the function Pagination of the file django_ajax/static/ajax-utilities/js/pagination.js of the component Backslash Handler. The manipulation of the argument url leads to cross site scripting. The attack may be initiated remotely. The patch is named 329eb1dd1580ca1f9d4f95bc69939833226515c9. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-222611.
[ { "commit_message": "[PATCH] Improve XSS protection Modern browsers treat the backslash as normal slashes when used in the URLs. So instead of using the hash value \"#page://google.com\", we can use \"#page:/\\google.com\" to bypasses the XSS protection django_ajax/static/ajax-utilities/js/pagination.js | 3 ++-...
CWE-79 Cross Site Scripting
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
[ { "commit_message": "[PATCH] KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kerne...
n/a
GHSA-v75g-77vf-6jjq
Para Server Logs Sensitive Information
null
[ { "commit_message": "[PATCH] removed logging of root app secret when initializing Para .../main/java/com/erudika/para/server/utils/HealthUtils.java | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSAxZThhODk1NTg1NDI4NTRiYjA2ODNhYjIzNGM0NDI5YWQ5M2IwODM1IE1vbiBTZXAgMTcgMDA6M...
null
CVE-2025-3933
Regular Expression Denial of Service (ReDoS) in huggingface/transformers
A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in the Hugging Face Transformers library, specifically within the DonutProcessor class's `token2json()` method. This vulnerability affects versions 4.50.3 and earlier, and is fixed in version 4.52.1. The issue arises from the regex pattern `<s_(.*?)>` which can be exploited to cause excessive CPU consumption through crafted input strings due to catastrophic backtracking. This vulnerability can lead to service disruption, resource exhaustion, and potential API service vulnerabilities, impacting document processing tasks using the Donut model.
[ { "commit_message": "[PATCH] Fix donut backtracking (#37788) * Fix donut backtracking * make fixup * Trigger tests * Remove old line * Update code * Fix reversed slice src/transformers/models/donut/processing_donut.py | 12 ++++++++---- 1 file changed, 8 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJ...
CWE-1333 Inefficient Regular Expression Complexity
CVE-2025-25285
@octokit/endpoint has a Regular Expression in parse that Leads to ReDoS Vulnerability Due to Catastrophic Backtracking
@octokit/endpoint turns REST API endpoints into generic request options. Starting in version 4.1.0 and prior to version 10.1.3, by crafting specific `options` parameters, the `endpoint.parse(options)` call can be triggered, leading to a regular expression denial-of-service (ReDoS) attack. This causes the program to hang and results in high CPU utilization. The issue occurs in the `parse` function within the `parse.ts` file of the npm package `@octokit/endpoint`. Version 10.1.3 contains a patch for the issue.
[ { "commit_message": "[PATCH] Merge commit from fork * Fix regular term vulnerability * add test to prevent future regressions * Fix the other regular term vulnerability * Trigger Build Co-authored-by: DayShift <113507098+ShiyuBanzhou@users.noreply.github.com> Co-authored-by: DayShift <2922897389@qq.com> src/par...
CWE-1333: Inefficient Regular Expression Complexity
GHSA-mjvp-pgrg-jw5h
null
[ { "commit_message": "[PATCH] Update tests to pick up upstream changes. core/php7.1Action/CHANGELOG.md | 4 + core/php7.1Action/router.php | 2 +- core/php7.2Action/CHANGELOG.md | 4 + core/php7.2Action/router.php | 2 +- tests/.pydevproject ...
null
CVE-2017-9224
An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds read occurs in match_at() during regular expression searching. A logical error involving order of validation and access in match_at() could result in an out-of-bounds read from a stack buffer.
[ { "commit_message": "[PATCH] fix #57 : DATA_ENSURE() check must be before data access src/regexec.c | 5 ----- 1 file changed, 5 deletions(-)", "patch_text_b64": "RnJvbSA2OTAzMTNhMDYxZjdhNGZhNjE0ZWM1Y2M4MzY4YjRmMjI4NGUwNTliIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiAiSy5Lb3Nha28iIDxrb3Nha29Ac29mbmVjLmNvLmpwPg...
n/a
CVE-2015-1593
The stack randomization feature in the Linux kernel before 3.19.1 on 64-bit platforms uses incorrect data types for the results of bitwise left-shift operations, which makes it easier for attackers to bypass the ASLR protection mechanism by predicting the address of the top of the stack, related to the randomize_stack_top function in fs/binfmt_elf.c and the stack_maxrandom_size function in arch/x86/mm/mmap.c.
[ { "commit_message": "[PATCH] x86, mm/ASLR: Fix stack randomization on 64-bit systems The issue is that the stack for processes is not properly randomized on 64 bit architectures due to an integer overflow. The affected function is randomize_stack_top() in file \"fs/binfmt_elf.c\": static unsigned long randomize...
n/a
GHSA-rg7g-558c-fp2q
null
[ { "commit_message": "[PATCH] Mandril: check decoded URI (fix #92) Signed-off-by: Eduardo Silva <eduardo@monkey.io> plugins/mandril/mandril.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAxNWY3MmMxZWU1ZTBhZmFkMjAyMzJiZGYwZmNlY2FiOGQ2MmE1ZDg5IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjA...
null
GHSA-v8r4-hc5w-5ww3
null
[ { "commit_message": "[PATCH] patch 9.0.0101: invalid memory access in diff mode with \"dp\" and undo Problem: Invalid memory access in diff mode with \"dp\" and undo. Solution: Make sure the line number does not go below one. src/diff.c | 9 ++++++--- src/testdir/test_diffmode.vim | 14 +...
null
PYSEC-2023-55
null
[ { "commit_message": "[PATCH] Release note for CVE-2023-28836 in 4.1.4 CHANGELOG.txt | 1 + docs/releases/4.1.4.md | 6 ++++++ 2 files changed, 7 insertions(+)", "patch_text_b64": "RnJvbSBlZWZjMzM4MWQzN2I0NzY3OTE2MTBlNWQzMDU5NGZhZTQ0M2YzM2FmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBNYXR0IFdlc3Rjb3R0I...
null
GHSA-f8gp-vg7w-rp8x
null
[ { "commit_message": "[PATCH] Set correct content type for JSON responses MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Signed-off-by: Michal Čihař <michal@cihar.com> import_status.php | 6 +++--- libraries/Response.class.php | 5 +---- lib...
null
CVE-2020-14971
Pi-hole through 5.0 allows code injection in piholedhcp (the Static DHCP Leases section) by modifying Teleporter backup files and then restoring them. This occurs in settings.php. To exploit this, an attacker would request a backup of limited files via teleporter.php. These are placed into a .tar.gz archive. The attacker then modifies the host parameter in dnsmasq.d files, and then compresses and uploads these files again.
[ { "commit_message": "[PATCH] make use of utils.escapeHtml on the JS side of things, and html_entity_decode/htmlentities in PHP Signed-off-by: Adam Warner <me@adamwarner.co.uk> dns_records.php | 1 + scripts/pi-hole/js/customdns.js | 6 +++-- scripts/pi-hole/js/groups-adlists.js | 10 ++...
n/a
CVE-2022-31129
Inefficient Regular Expression Complexity in moment
moment is a JavaScript date library for parsing, validating, manipulating, and formatting dates. Affected versions of moment were found to use an inefficient parsing algorithm. Specifically using string-to-date parsing in moment (more specifically rfc2822 parsing, which is tried by default) has quadratic (N^2) complexity on specific inputs. Users may notice a noticeable slowdown is observed with inputs above 10k characters. Users who pass user-provided strings without sanity length checks to moment constructor are vulnerable to (Re)DoS attacks. The problem is patched in 2.29.4, the patch can be applied to all affected versions with minimal tweaking. Users are advised to upgrade. Users unable to upgrade should consider limiting date lengths accepted from user input.
[ { "commit_message": "[PATCH] [bugfix] Fix redos in preprocessRFC2822 regex (#6015) * fix ReDoS in preprocessRFC2822 regex Fixes: [#2936](https://github.com/moment/moment/issues/6012) Disallow nested rfc2822 comments to prevent quadratic regex execution time (i.e each open bracket is considered at most twice). s...
CWE-400: Uncontrolled Resource Consumption
CVE-2024-47178
basic-auth-connect's callback uses time unsafe string comparison
basic-auth-connect is Connect's Basic Auth middleware in its own module. basic-auth-connect < 1.1.0 uses a timing-unsafe equality comparison that can leak timing information. This issue has been fixed in basic-auth-connect 1.1.0.
[ { "commit_message": "[PATCH] feat: add timing safe equal comparison * chore: add tsscmp@1.0.6 as dependency * feat: add timing safe equal comparison Co-authored-by: Blake Embrey <hello@blakeembrey.com> index.js | 5 ++++- package.json | 7 +++++-- 2 files changed, 9 insertions(+), 3 deletions(-)", "patch_...
CWE-208: Observable Timing Discrepancy
CVE-2021-31256
Memory leak in the stbl_GetSampleInfos function in MP4Box in GPAC 1.0.1 allows attackers to read memory via a crafted file.
[ { "commit_message": "[PATCH] fixed #1705 src/isomedia/stbl_read.c | 2 ++ 1 file changed, 2 insertions(+)", "patch_text_b64": "RnJvbSAyZGEyZjY4YmZmZDUxZDg5YjFkMjcyZDIyYWE4Y2MwMjNjMWMwNjZlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBqZWFubGYgPGplYW5sZkBncGFjLmlvPgpEYXRlOiBGcmksIDEyIE1hciAyMDIxIDExOjQ2OjU2ICswMT...
n/a
GHSA-qc3q-8rr8-8p5v
Cross site scripting in opencart
null
[ { "commit_message": "[PATCH] added login to comment upload/catalog/controller/account/login.php | 12 +++++++--- upload/catalog/controller/cms/comment.php | 20 ++++++++++------ upload/catalog/controller/startup/seo_url.php | 6 ++--- .../catalog/view/template/account/login.twig | 6 ++--- upload/catalog/v...
null
GHSA-gjhx-wc4x-rwwp
null
[ { "commit_message": "[PATCH] hw/nvme: fix null pointer access in directive receive nvme_directive_receive() does not check if an endurance group has been configured (set) prior to testing if flexible data placement is enabled or not. Fix this. Cc: qemu-stable@nongnu.org Resolves: https://gitlab.com/qemu-project...
null
GHSA-mc7w-4cjf-c973
OS Command Injection in node-opencv
null
[ { "commit_message": "[PATCH] Remove untrusted input to exec utils/find-opencv.js | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSA4MWE0Yjg2MjAxODhlODlmN2U0ZmM5ODVmM2M4OWI1OGQ0YmNjODZiIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBQZXRlciBCcmFkZW4gPHBldGVyYnJhZGVuQHBldGVyYnJ...
null
CVE-2020-9757
The SEOmatic component before 3.3.0 for Craft CMS allows Server-Side Template Injection that leads to RCE via malformed data to the metacontainers controller.
[ { "commit_message": "[PATCH] Version 3.3.0 CHANGELOG.md | 3 +++ 1 file changed, 3 insertions(+)", "patch_text_b64": "RnJvbSA2NWFiNjU5Y2I2YzkxNGM3YWQ2NzFhZjFlNDE3YzBkYTI0MzFmNzliIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBbmRyZXcgV2VsY2ggPGFuZHJld0BrZWx1bGkubG9jYWw+CkRhdGU6IE1vbiwgMjcgQXByIDIwMjAgMTk6MjU6MTI...
n/a
CVE-2015-10116
RealFaviconGenerator Favicon Plugin class-favicon-by-realfavicongenerator-admin.php install_new_favicon cross-site request forgery
A vulnerability classified as problematic has been found in RealFaviconGenerator Favicon Plugin up to 1.2.12 on WordPress. This affects the function install_new_favicon of the file admin/class-favicon-by-realfavicongenerator-admin.php. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. Upgrading to version 1.2.13 is able to address this issue. The identifier of the patch is 949a1ae7216216350458844f50a72f100b56d4e7. It is recommended to upgrade the affected component. The identifier VDB-230661 was assigned to this vulnerability.
[ { "commit_message": "[PATCH] XSS vulnerability fixed, reported by Kacper Szurek git-svn-id: https://plugins.svn.wordpress.org/favicon-by-realfavicongenerator/trunk@1125286 b8457f37-d9ea-0310-8a92-e5e31aec5664 README.txt | 8 +++-- ...-favicon-by-realfavicongenerator-admin.php ...
CWE-352 Cross-Site Request Forgery
CVE-2024-28233
XSS in JupyterHub via Self-XSS leveraged by Cookie Tossing
JupyterHub is an open source multi-user server for Jupyter notebooks. By tricking a user into visiting a malicious subdomain, the attacker can achieve an XSS directly affecting the former's session. More precisely, in the context of JupyterHub, this XSS could achieve full access to JupyterHub API and user's single-user server. The affected configurations are single-origin JupyterHub deployments and JupyterHub deployments with user-controlled applications running on subdomains or peer subdomains of either the Hub or a single-user server. This vulnerability is fixed in 4.1.0.
[ { "commit_message": "[PATCH] 4.1.0 .github/workflows/test.yml | 3 + docs/source/explanation/websecurity.md | 178 ++++++++++++++-- docs/source/reference/changelog.md | 51 +++++ jupyterhub/_xsrf_utils.py | 210 +++++++++++++++++++ jupyterhub/apihandlers/base.py | ...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2016-9288
In framework/modules/navigation/controllers/navigationController.php in Exponent CMS v2.4.0 or older, the parameter "target" of function "DragnDropReRank" is directly used without any filtration which caused SQL injection. The payload can be used like this: /navigation/DragnDropReRank/target/1.
[ { "commit_message": "[PATCH] fix security vulnerability to reranking pages; reported by kyohpc .../modules/navigation/controllers/navigationController.php | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSAyZGRmZmIyZTdlYWZlNDgzMGUzNDgzYTRiNDM3ODczMDIyYzQ2MWJhIE1vbiBTZXAgM...
n/a
GHSA-mhpq-9638-x6pw
Denial of service when decrypting attack controlled input in github.com/dvsekhvalnov/jose2go
null
[ { "commit_message": "[PATCH] Adding min/max iteration count guards to pbes2-hmac-aeskw algorithm jose_test.go | 34 ++++++++++++++++++++++++++++++ pbse2_hmac_aeskw.go | 51 +++++++++++++++++++++++++++++++++++++++------ 2 files changed, 79 insertions(+), 6 deletions(-)", "patch_text_b64": "RnJvbSBhNDU4N...
null
CVE-2021-3817
SQL Injection in wbce/wbce_cms
wbce_cms is vulnerable to Improper Neutralization of Special Elements used in an SQL Command
[ { "commit_message": "[PATCH] add captcha for login forgot wbce/admin/login/forgot/index.php | 176 ++++++++++-------- .../account/form_forgot.php | 161 +++++++++------- .../templates/form_forgot.twig | 8 +- .../argos_theme_reloaded/css/login.css | 9 + wbce/...
CWE-89 Improper Neutralization of Special Elements used in an SQL Command
CVE-2022-2284
Heap-based Buffer Overflow in vim/vim
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.
[ { "commit_message": "[PATCH] patch 9.0.0017: accessing memory beyond the end of the line Problem: Accessing memory beyond the end of the line. Solution: Stop Visual mode when closing a window. src/testdir/test_visual.vim | 12 ++++++++++++ src/version.c | 2 ++ src/window.c | 2...
CWE-122 Heap-based Buffer Overflow
GHSA-675q-66gf-gqg8
OneUptime is Vulnerable to Privilege Escalation via Login Response Manipulation
null
[ { "commit_message": "[PATCH] fix(admin): restrict AdminDashboard to master admins and guard index render Add ensureMasterAdminAccess in AdminDashboard/Serve.ts to decode JWT, validate isMasterAdmin and return a NotAuthorized response when access is not allowed. Wire this function into App.init as getVariablesTo...
null
GHSA-h7v2-cvh5-xv63
null
[ { "commit_message": "[PATCH] CVE-2017-12990/Fix printing of ISAKMPv1 Notification payload data. MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit The closest thing to a specification for the contents of the payload data is draft-ietf-ipsec-notifymsg-04, and nothing in the...
null
GHSA-4365-fhm5-qcrx
Maliciously Crafted Model Archive Can Lead To Arbitrary File Write
null
[ { "commit_message": "[PATCH] Swap calls to extractall for TarSafe equivalent poetry.lock | 445 +++++++++++++++++++++++++----------------- pyproject.toml | 1 + rasa/model.py | 3 +- rasa/nlu/persistor.py | 4 +- rasa/utils/io.py | 3 +- 5 files changed, 275 insertions(+), 181 d...
null
PYSEC-2020-219
null
[ { "commit_message": "[PATCH] Prevent unauthorized users managing others' device This adds a permissions check on the device list and delete views. When a user has the 'change_user' permission, they are allowed to view and delete other users' 2FA devices. If they don't have the permission, they are only allowed ...
null
GHSA-rqg5-w7gw-xqvq
null
[ { "commit_message": "[PATCH] [api] support binary package upload for the admin src/api/app/controllers/build_controller.rb | 31 +++++++++---------- .../test/functional/build_controller_test.rb | 26 ++++++++++++++++ 2 files changed, 40 insertions(+), 17 deletions(-)", "patch_text_b64": "RnJvbSA1MjgxZTRiZm...
null
GHSA-wp68-xrfg-xvq4
Cockpit Arbitrary File Upload
null
[ { "commit_message": "[PATCH] add additional security check for uploading files modules/Assets/bootstrap.php | 2 +- modules/Finder/Controller/Finder.php | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA5ODRlZjlhZDI3MDM1N2I4NDNhZjYzYzgxZGI5NTE3OGVhZTQyY2FlIE1vbiBTZXA...
null
CVE-2021-30022
There is a integer overflow in media_tools/av_parsers.c in the gf_avc_read_pps_bs_internal in GPAC from 0.5.2 to 1.0.1. pps_id may be a negative number, so it will not return. However, avc->pps only has 255 unit, so there is an overflow, which results a crash.
[ { "commit_message": "[PATCH] add safety in avc/hevc/vvc sps/pps/vps ID check - cf #1720 #1721 #1722 src/media_tools/av_parsers.c | 27 ++++++++++++--------------- 1 file changed, 12 insertions(+), 15 deletions(-)", "patch_text_b64": "RnJvbSA1MWNkYjY3ZmY3YzVmMTI0MmFjNThjNWFhNjAzY2VhZjE3OTNiNzg4IE1vbiBTZXAgMTc...
n/a
CVE-2015-4410
The Moped::BSON::ObjecId.legal? method in rubygem-moped before commit dd5a7c14b5d2e466f7875d079af71ad19774609b allows remote attackers to cause a denial of service (worker resource consumption) or perform a cross-site scripting (XSS) attack via a crafted string.
[ { "commit_message": "[PATCH] Merge Replica Set Refactor * Removes Server, and Socket; replaced with Node, and Connection. Replica sets are now much more robustly supported, including failover and discovery. * Refactors specs. Internal APIs are now tested with integration specs through the public APIs. * More do...
n/a
GHSA-4q53-fqhc-cr46
ember-source Cross-site Scripting vulnerability
null
[ { "commit_message": "[PATCH] [SECURITY CVE-2014-0046] Ensure link-to non-block escapes title. packages/ember-routing/lib/helpers/link_to.js | 11 +++++++++- packages/ember/tests/helpers/link_to_test.js | 22 +++++++++++++++++++ 2 files changed, 32 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA0NWV...
null
CVE-2018-6335
A Malformed h2 frame can cause 'std::out_of_range' exception when parsing priority meta data. This behavior can lead to denial-of-service. This affects all supported versions of HHVM (3.25.2, 3.24.6, and 3.21.10 and below) when using the proxygen server to handle HTTP2 requests.
[ { "commit_message": "[PATCH] [security][CVE-2018-6335] Fix potential crash in HTTP2 padding handling CVE-2018-6335 patches/proxygen-CVE-2018-6335.patch | 100 +++++++++++++++++++++++++++ 1 file changed, 100 insertions(+) create mode 100644 patches/proxygen-CVE-2018-6335.patch", "patch_text_b64": "RnJvbSA0Y2I...
Denial of Service (CWE-400)
CVE-2019-18985
Pimcore before 6.2.2 lacks brute force protection for the 2FA token.
[ { "commit_message": "[PATCH] Brute-force attack protection for 2fa codes .../AdminBundle/Controller/Admin/LoginController.php | 11 +++++++---- .../AdminBundle/Controller/Admin/UserController.php | 2 -- 2 files changed, 7 insertions(+), 6 deletions(-)", "patch_text_b64": "RnJvbSA5ZjJkMDc1MjQzYTgzOTJjMTE0...
n/a
CVE-2020-26286
Arbitary file upload
HedgeDoc is a collaborative platform for writing and sharing markdown. In HedgeDoc before version 1.7.1 an unauthenticated attacker can upload arbitrary files to the upload storage backend including HTML, JS and PHP files. The problem is patched in HedgeDoc 1.7.1. You should however verify that your uploaded file storage only contains files that are allowed, as uploaded files might still be served. As workaround it's possible to block the `/uploadimage` endpoint on your instance using your reverse proxy. And/or restrict MIME-types and file names served from your upload file storage.
[ { "commit_message": "[PATCH 1/5] Fix arbitary file upload for uploadimage API endpoint This patch fixes a security issue with all existing CodiMD and HedgeDoc installation which allows arbitary file uploads to instances that expose the `/uploadimage` API endpoint. With the patch it implies the same restrictions...
CWE-434 Unrestricted Upload of File with Dangerous Type
CVE-2015-2678
Multiple cross-site scripting (XSS) vulnerabilities in MetalGenix GeniXCMS before 0.0.2 allow remote attackers to inject arbitrary web script or HTML via the (1) cat parameter in the categories page to gxadmin/index.php or (2) page parameter to index.php.
[ { "commit_message": "[PATCH] Security FIX, Bug FIX gxadmin/inc/categories.php | 42 ++- gxadmin/inc/menus.php | 35 ++- gxadmin/inc/menus_form.php | 30 +++ gxadmin/inc/menus_form_edit.php | 38 ++- gxadmin/inc/pages.php ...
n/a
CVE-2023-37266
Weak json web token (JWT) secrets in CasaOS
CasaOS is an open-source Personal Cloud system. Unauthenticated attackers can craft arbitrary JWTs and access features that usually require authentication and execute arbitrary commands as `root` on CasaOS instances. This problem was addressed by improving the validation of JWTs in commit `705bf1f`. This patch is part of CasaOS 0.4.4. Users should upgrade to CasaOS 0.4.4. If they can't, they should temporarily restrict access to CasaOS to untrusted users, for instance by not exposing it publicly.
[ { "commit_message": "[PATCH] Update jwt (#1025) go.mod | 16 ++++++++-------- go.sum | 33 +++++++++++++++++---------------- route/v1.go | 8 +++++++- route/v2.go | 13 +++++++++---- 4 files changed, 41 insertions(+), 29 deletions(-)", "patch_text_b64": "RnJvbSA3MDViZjFmYWNiZmZkMmNhNDBiMTU5YjAzMDMxMz...
CWE-287: Improper Authentication
GHSA-674g-g96j-pr63
null
[ { "commit_message": "[PATCH] Check for overflow in BER decoder EOC scanning doc/security.rst | 11 ++++++++++- src/lib/asn1/ber_dec.cpp | 5 ++++- src/lib/utils/info.txt | 3 ++- src/lib/utils/safeint.h | 39 +++++++++++++++++++++++++++++++++++++++ 4 files changed, 55 insertions(+), 3 deletions(-) crea...
null
GHSA-8v2m-x872-56fc
null
[ { "commit_message": "[PATCH] Fixed potential security exploit. git-svn-id: https://plugins.svn.wordpress.org/secure-files/trunk@3641 b8457f37-d9ea-0310-8a92-e5e31aec5664 secure-files.php | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBjYWIwMjVlNWZjMmJjZGFkODAzMmQ4MzNlYmM...
null
GHSA-5w65-6875-rhq8
Undefined Behavior in sailsjs-cacheman
null
[ { "commit_message": "[PATCH] Fix config variable exposing to global scope lib/sailsCacheman.js | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA0YTQ1NmY0NDE0MWFlMmQ1YWVkOGNiMzJhODIwNjMzNTZkY2MzMThmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBQYXZsbyBaaHVrb3YgPHBhaGFuMzVAdXNlcnM...
null
GHSA-f655-xhvm-cwp4
Cross-site Scripting in Jenkins GitLab Plugin
null
[ { "commit_message": "[PATCH] [SECURITY-2316] .../gitlabjenkins/cause/GitLabWebHookCause/description.jelly | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAyNGU5YTk5ZDgxNTFiNTM0NTEwOWVmMTJjZGRjMWFiMzIzYmFhNGVlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBEYW5pZWwgQmVjayA8ZGFu...
null
GHSA-48h7-cvhw-3w6x
null
[ { "commit_message": "[PATCH] Bluetooth: L2CAP: Fix attempting to access uninitialized memory MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit On l2cap_parse_conf_req the variable efs is only initialized if remote_efs has been set. CVE: CVE-2022-42895 CC: stable@vger.kern...
null
CVE-2022-3234
Heap-based Buffer Overflow in vim/vim
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0483.
[ { "commit_message": "[PATCH] patch 9.0.0483: illegal memory access when replacing in virtualedit mode Problem: Illegal memory access when replacing in virtualedit mode. Solution: Check for replacing NUL after Tab. src/ops.c | 12 ++++++++++-- src/testdir/test_virtualedit.vim | 14 ++++...
CWE-122 Heap-based Buffer Overflow
GHSA-gwvm-45gx-3cf8
Authorization Header forwarded on redirect
null
[ { "commit_message": "[PATCH] Remove Authorization headers regardless of case on cross-origin redirects (#1511) CHANGES.rst | 2 ++ CONTRIBUTORS.txt | 3 +++ src/urllib3/poolmanager.py | 7 +++++-- src/urllib3/util/retry.py | ...
null
GHSA-cm22-4g7w-348p
serve-static vulnerable to template injection that can lead to XSS
null
[ { "commit_message": "[PATCH] Merge commit from fork Co-authored-by: Chris de Almeida <ctcpip@users.noreply.github.com> index.js | 3 +-- test/test.js | 4 ++-- 2 files changed, 3 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSAwYzExZmFkMTU5ODk4Y2RjNjlmZDlhYjYzMjY5YjcyNDY4ZWNhZjZiIE1vbiBTZXAgMTcg...
null
GHSA-hv87-47h9-jcvq
Uncontrolled recursion in rust-yaml
null
[ { "commit_message": "[PATCH] Prevent too deep recursion src/scanner.rs | 10 ++++++---- src/yaml.rs | 12 ++++++++++++ 2 files changed, 18 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSBkNjFiNDljYjkwMzkxZmM0ZjdmNzJhMWFiZTU5NzQ3NmM4NjUxYTA3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBLb25yYWQgQm9yb...
null
CVE-2024-22193
vantage6 unencrypted task can be created in encrypted collaboration
The vantage6 technology enables to manage and deploy privacy enhancing technologies like Federated Learning (FL) and Multi-Party Computation (MPC). There are no checks on whether the input is encrypted if a task is created in an encrypted collaboration. Therefore, a user may accidentally create a task with sensitive input data that will then be stored unencrypted in a database. Users should ensure they set the encryption setting correctly. This vulnerability is patched in 4.2.0.
[ { "commit_message": "[PATCH] Fix that tasks are not created if the input encryption status does not match the expectation of encryption in the collaboration .../vantage6/server/resource/task.py | 66 ++++++++++++++++++- 1 file changed, 63 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSA0ZW...
CWE-922: Insecure Storage of Sensitive Information
GHSA-pm9p-9926-w68m
Denial of Service in ecstatic
null
[ { "commit_message": "[PATCH] Remove stripping of null bytes This was at one point necessary because of an old bug in url.parse See: https://github.com/jfhbrook/node-ecstatic/issues/16#issuecomment-3039914 See: https://github.com/jfhbrook/node-ecstatic/commit/43f7e72a31524f88f47e367c3cc3af710e67c9f4 But this ope...
null
CVE-2016-7103
Cross-site scripting (XSS) vulnerability in jQuery UI before 1.12.0 might allow remote attackers to inject arbitrary web script or HTML via the closeText parameter of the dialog function.
[ { "commit_message": "[PATCH] Dialog: Escape closeText option before passing it to button Ref gh-1632 Fixes jquery/api.jqueryui.com#281 tests/unit/dialog/options.js | 7 ++++++- ui/widgets/dialog.js | 4 ++-- 2 files changed, 8 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSA5NjQ0ZTdiYWU5MTE2...
n/a
GHSA-c86q-rj37-8f85
LibreNMS has a stored XSS in ExamplePlugin with Device's Notes
null
[ { "commit_message": "[PATCH] Filter ExamplePlugin output (#16562) Filter device notes markdown output in ExamplePlugin Don't enable the ExamplePlugin, it does nothing... .../ExamplePlugin/resources/views/device-overview.blade.php | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-)", "patch_text_b64": ...
null
CVE-2016-8649
lxc-attach in LXC before 1.0.9 and 2.x before 2.0.6 allows an attacker inside of an unprivileged container to use an inherited file descriptor, of the host's /proc, to access the rest of the host's filesystem via the openat() family of syscalls.
[ { "commit_message": "[PATCH] attach: do not send procfd to attached process So far, we opened a file descriptor refering to proc on the host inside the host namespace and handed that fd to the attached process in attach_child_main(). This was done to ensure that LSM labels were correctly setup. However, by expl...
container bypass
CVE-2025-4754
Missing Session Revocation on Logout in ash_authentication_phoenix
Insufficient Session Expiration vulnerability in ash-project ash_authentication_phoenix allows Session Hijacking. This vulnerability is associated with program files lib/ash_authentication_phoenix/controller.ex. This issue affects ash_authentication_phoenix until 2.10.0.
[ { "commit_message": "[PATCH] improvement: revoke stored sessions on log out (#634) dev/dev_web/controllers/auth_controller.ex | 2 +- documentation/tutorials/get-started.md | 2 +- lib/ash_authentication_phoenix/controller.ex | 43 ++++++++++++++----- lib/ash_authentication_phoenix/plug.ex | 12...
CWE-613 Insufficient Session Expiration
GHSA-prc3-7f44-w48j
Missing XML Validation in Apache Tomcat
null
[ { "commit_message": "[PATCH] Small optimisation. The resolver and the factory are only used when running under a security manager so only load them in this case. Also avoid a possible memory leak when creating these objects. This is part 1 of 7 of the fix for CVE-2014-0119 git-svn-id: https://svn.apache.org/rep...
null
GHSA-w392-75q8-vr67
Guardrails has an arbitrary code execution vulnerability
null
[ { "commit_message": "[PATCH] safe eval guardrails/utils/validator_utils.py | 3 ++- tests/unit_tests/test_datatypes.py | 4 ++-- 2 files changed, 4 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSAxNDk1NWU2MjUxZmQ3MmQxMmY5YjNiZTcyOTc5NWEwMGE1ZTAwMjQxIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiB6c2ltam...
null
CVE-2025-55150
Stirling-PDF SSRF vulnerability on /api/v1/convert/html/pdf
Stirling-PDF is a locally hosted web application that performs various operations on PDF files. Prior to version 1.1.0, when using the /api/v1/convert/html/pdf endpoint to convert HTML to PDF, the backend calls a third-party tool to process it and includes a sanitizer for security sanitization which can be bypassed and result in SSRF. This issue has been patched in version 1.1.0.
[ { "commit_message": "[PATCH] url fixes for access issues (#4013) # Description of Changes This pull request introduces a new SSRF (Server-Side Request Forgery) protection mechanism for URL handling in the application. Key changes include adding a dedicated `SsrfProtectionService`, integrating SSRF-safe policies...
CWE-918: Server-Side Request Forgery (SSRF)
GHSA-mc63-4cpc-gjqj
null
[ { "commit_message": "[PATCH] fix for use-after-free (#240) src/request-handler.cpp | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSA4NjBmMDI1NDY4ZmViMzFjNDMyMjcxNTNkOGZiM2YzNDIxMGE1MjJlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBEYXZlIEhvcnRvbiA8ZGF2ZWhAYmVhY2hkb2duZXQu...
null