id
stringlengths
12
19
title
stringlengths
0
237
description
stringlengths
35
3.87k
patches
listlengths
1
22
cwe
stringlengths
2
440
GHSA-p4f9-7f2f-g69h
null
[ { "commit_message": "[PATCH] =?UTF-8?q?=E5=BC=BA=E5=AF=86=E7=A0=81=E7=AD=96=E7=95=A5?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit https://github.com/atjiu/pybbs/issues/201 .../co/yiiu/pybbs/controller/admin/UserAdminController.java | 3 +++ .../java/co/yiiu/pybbs/...
null
CVE-2022-0559
Use After Free in radareorg/radare2
Use After Free in GitHub repository radareorg/radare2 prior to 5.6.2.
[ { "commit_message": "[PATCH] Prefer memleak over usaf in io.bank's rbtree bug ##crash * That's a workaround, proper fix will come later * Reproducer: bins/fuzzed/iobank-crash * Reported by Akyne Choi via huntr.dev libr/io/io_bank.c | 8 +++++++- libr/util/new_rbtree.c | 4 ++-- 2 files changed, 9 insertions(...
CWE-416 Use After Free
GHSA-w44p-h466-6wfq
null
[ { "commit_message": "[PATCH] Bugfix: XSS and LDAP injection in ad-search-group-result.php Reported by Elias Hohl app/admin/groups/ad-search-group-result.php | 40 ++++++++++----------- app/admin/users/ad-search-result.php | 11 +++--- misc/CHANGELOG | 1 + 3 files changed, 26 i...
null
GHSA-3crj-w4f5-gwh4
Processing untrusted theming resources might execute arbitrary code (ACE)
null
[ { "commit_message": "<1410947+matz3@users.noreply.github.com> [PATCH] [BREAKING] Security: Disable JavaScript execution in Less.js Execution of JavaScript code located in *.less files is unexpected in the context of OpenUI5 / SAPUI5 development and poses a security threat. BREAKING CHANGE: Parser option `javasc...
null
GHSA-43p4-m455-4f4j
tRPC has possible prototype pollution in `experimental_nextAppDirCaller`
null
[ { "commit_message": "[PATCH] Fix bug (#7043) Co-authored-by: copilot-swe-agent[bot] <198982749+Copilot@users.noreply.github.com> .../http/formDataToObject.ts | 21 ++++++++++++++++--- 1 file changed, 18 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSA3ODYyOWQ1MjQ5NjhlZjhkYjVhN2FkZj...
null
CVE-2022-1071
User after free in mrb_vm_exec in mruby/mruby
User after free in mrb_vm_exec in GitHub repository mruby/mruby prior to 3.2.
[ { "commit_message": "[PATCH] vm.c: stack may be reallocated in functions calls. Probably due to recursive VM calls via `mrb_funcall()`. src/vm.c | 17 +++++++++++------ 1 file changed, 11 insertions(+), 6 deletions(-)", "patch_text_b64": "RnJvbSBhYWEyOGE1MDg5MDMwNDFkZDczOTlkNDE1OWE4YWNlOTc2NmIwMjJmIE1vbiBTZX...
CWE-416 Use After Free
CVE-2023-2616
Cross-site Scripting (XSS) - Generic in pimcore/pimcore
Cross-site Scripting (XSS) - Generic in GitHub repository pimcore/pimcore prior to 10.5.21.
[ { "commit_message": "[PATCH] [Security] Fix xss in static routes panel (#14947) * added new helper function to htmlEncode textFields, fixed xss issue in static routes panel * added `htmlspecialchars` to model * fixed double encode issue * fixed double encode problem in BE * changed type of `htmlspecialchars`, a...
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-p8gp-899c-jvq9
Wallabag user can reset data unintentionally
null
[ { "commit_message": "[PATCH] Replace GET way to POST way to reset data user Signed-off-by: Kevin Decherf <kevin@kdecherf.com> .../Controller/ConfigController.php | 8 +++- .../Resources/views/Config/index.html.twig | 40 +++++++++++++------ .../Controller/ConfigControllerTest.php | 15 ++++--- ...
null
PYSEC-2020-291
null
[ { "commit_message": "[PATCH] [tflite]: Insert `nullptr` checks when obtaining tensors. As part of ongoing refactoring, `tflite::GetInput`, `tflite::GetOutput`, `tflite::GetTemporary` and `tflite::GetIntermediates` will return `nullptr` in some cases. Hence, we insert the `nullptr` checks on all usages. We also ...
null
GHSA-qch4-jmf8-xvp7
Cross-site Scripting in librenms/librenms
null
[ { "commit_message": "[PATCH] Fix possible RSS XSS (#14457) Escape titles when shown. Body was already cleaned. includes/html/pages/notifications.inc.php | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSA4ZTg1Njk4YWEzYWE0ODg0YzJmM2Q2Yzk4NzU0MjQ3N2ViNjRmMDdjIE1vbiBTZXAgMT...
null
CVE-2013-2547
The crypto_report_one function in crypto/crypto_user.c in the report API in the crypto user configuration API in the Linux kernel through 3.8.2 does not initialize certain structure members, which allows local users to obtain sensitive information from kernel heap memory by leveraging the CAP_NET_ADMIN capability.
[ { "commit_message": "[PATCH] crypto: user - fix info leaks in report API Three errors resulting in kernel memory disclosure: 1/ The structures used for the netlink based crypto algorithm report API are located on the stack. As snprintf() does not fill the remainder of the buffer with null bytes, those stack byt...
n/a
PYSEC-2017-102
null
[ { "commit_message": "[PATCH] Random timer to avoid timing oracles and simple bruteforce attacks Important note: this is a security fix. radicale/auth/htpasswd.py | 10 +++++++--- 1 file changed, 7 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSAxOTBiMWRkNzk1ZjBjNTUyYTQ5OTI0NDVhMjMxZGE3NjAyMTExODNiI...
null
GHSA-pq29-2m6m-938v
null
[ { "commit_message": "[PATCH] patch 8.2.4763: using invalid pointer with \"V:\" in Ex mode Problem: Using invalid pointer with \"V:\" in Ex mode. Solution: Correctly handle the command being changed to \"+\". src/ex_docmd.c | 29 ++++++++++++++++++++++++----- src/testdir/test_ex_mode.vim | 13 +...
null
GHSA-8xhg-x93x-j983
null
[ { "commit_message": "[PATCH] Add Selector terminus for file_content/file_metadata This terminus is now the default, and encapsulates the behavior that was previously in the IndirectionHooks. That is, we dynamically select the terminus to use for a file request based on the key. However, for the puppet master, w...
null
GHSA-qcf3-9vmh-xw4r
Improper Limitation of a Pathname to a Restricted Directory in zt-zip
null
[ { "commit_message": "[PATCH] Fixed potential security vulnerability reported by Snyk Security Research Team This is an arbitrary file write vulnerability, that can be achieved using a specially crafted zip archive, that holds path traversal filenames. So when the filename gets concatenated to the target extract...
null
GHSA-5wr6-26jx-jwqg
null
[ { "commit_message": "[PATCH] Fix #491, issue with part number range check reconstructing chunk offset table The chunk offset was incorrectly testing for a part number that was the same size (i.e. an invalid index) Signed-off-by: Kimball Thurston <kdt3rd@gmail.com> OpenEXR/IlmImf/ImfMultiPartInputFile.cpp | 2 +-...
null
CVE-2025-60319
PerfreeBlog v4.0.11 is vulnerable to Server-Side Request Forgery due to a missing authorization check in the uploadAttachByUrl API endpoint (AttachController.java).
[ { "commit_message": "[PATCH] fix: issues 20 .../com/perfree/controller/auth/attach/AttachController.java | 1 + 1 file changed, 1 insertion(+)", "patch_text_b64": "RnJvbSAxMDNjNzkxNjVlM2E0MWExNzI5MTg4ZmRjOGExZTkwYzk3YzBhMDZkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBQZXJmcmVlIDxwZXJmcmVlQDEyNi5jb20+CkRhd...
n/a
CVE-2017-16840
The VC-2 Video Compression encoder in FFmpeg 3.0 and 3.4 allows remote attackers to cause a denial of service (out-of-bounds read) because of incorrect buffer padding for non-Haar wavelets, related to libavcodec/vc2enc.c and libavcodec/vc2enc_dwt.c.
[ { "commit_message": "[PATCH] vc2enc_dwt: pad the temporary buffer by the slice size Since non-Haar wavelets need to look into pixels outside the frame, we need to pad the buffer. The old factor of two seemed to be a workaround that fact and only padded to the left and bottom. This correctly pads by the slice si...
n/a
GHSA-q2pj-6v73-8rgj
TypeORM vulnerable to SQL injection via crafted request to repository.save or repository.update
null
[ { "commit_message": "[PATCH] fix(mysql): set `stringifyObjects` implicitly (#11574) src/driver/mysql/MysqlDriver.ts | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBkNTdmZTNiZDg1NzhiMGI4Zjk4NDc2NDdmZDA0NmJjY2Y4MjVhN2VmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBMdWNpYW4gTW9j...
null
GHSA-9hq9-cr36-4wpj
TYPO3 Allows Unrestricted File Upload in File Abstraction Layer
null
[ { "commit_message": "[PATCH] [SECURITY] Enforce file extension and MIME-type consistency The File Abstraction Layer (FAL) methods `addFile`, `renameFile`, `replaceFile`, and `addUploadedFile` in `ResourceStorage` have been enhanced to enforce consistency and security of file data. Two validations are now applie...
null
CVE-2017-9250
The lexer_process_char_literal function in jerry-core/parser/js/js-lexer.c in JerryScript 1.0 does not skip memory allocation for empty strings, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via malformed JavaScript source code, related to the jmem_heap_free_block function.
[ { "commit_message": "[PATCH] Do not allocate memory for zero length strings. Fixes #1821. JerryScript-DCO-1.0-Signed-off-by: Zoltan Herczeg zherczeg.u-szeged@partner.samsung.com jerry-core/parser/js/js-lexer.c | 5 +++++ tests/jerry/regression-test-issue-1833.js | 16 ++++++++++++++++ 2 files changed, ...
n/a
CVE-2019-18667
/usr/local/www/freeradius_view_config.php in the freeradius3 package before 0.15.7_3 for pfSense on FreeBSD allows a user with an XSS payload as password or username to execute arbitrary javascript code on a victim browser.
[ { "commit_message": "[PATCH] Encode FreeRADIUS config file display output. Fixes #9866 net/pfSense-pkg-freeradius3/Makefile | 2 +- .../files/usr/local/www/freeradius_view_config.php | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSAzM...
n/a
CVE-2012-1123
The mci_check_login function in api/soap/mc_api.php in the SOAP API in MantisBT before 1.2.9 allows remote attackers to bypass authentication via a null password.
[ { "commit_message": "[PATCH] Fix 0013901: SOAP API allows invoking methods without proper authentication Note: only applied to 1.2.x not 'next', as the code is changing anyway api/soap/mc_api.php | 5 +++++ 1 file changed, 5 insertions(+)", "patch_text_b64": "RnJvbSBmNTEwNmJlNTJjZjZhYTcyYzUyMWYzODhlNGFiYjVmM...
n/a
GHSA-cw9c-v3v2-99hm
Blind SQL Injection with privileged Cloud Foundry UAA endpoints
null
[ { "commit_message": "[PATCH] better parsing of attributes .../rest/jdbc/SimpleSearchQueryConverter.java | 113 ++++++++++++++++-- .../jdbc/SimpleSearchQueryConverterTests.java | 94 +++++++++++++++ .../jdbc/ScimSearchQueryConverterTests.java | 8 +- .../jdbc/SimpleSearchQueryConverterTests.java | 95 ++++++++...
null
CVE-2014-3534
arch/s390/kernel/ptrace.c in the Linux kernel before 3.15.8 on the s390 platform does not properly restrict address-space control operations in PTRACE_POKEUSR_AREA requests, which allows local users to obtain read and write access to kernel memory locations, and consequently gain privileges, via a crafted application that makes a ptrace system call.
[ { "commit_message": "[PATCH] s390/ptrace: fix PSW mask check The PSW mask check of the PTRACE_POKEUSR_AREA command is incorrect. The PSW_MASK_USER define contains the PSW_MASK_ASC bits, the ptrace interface accepts all combinations for the address-space-control bits. To protect the kernel space the PSW mask che...
n/a
CVE-2021-46461
njs through 0.7.0, used in NGINX, was discovered to contain an out-of-bounds array access via njs_vmcode_typeof in /src/njs_vmcode.c.
[ { "commit_message": "[PATCH] Added missing element in typeof table for DataView() type. Previously, typeof operation for DataView object resulted in out of bounds array accessing. This fixes #450 issue on Github. src/njs_vmcode.c | 1 + src/test/njs_unit_test.c | 3 +++ 2 files changed, 4 insertions(+)", ...
n/a
GHSA-w46j-8hm6-h8mm
XSS in apexcharts
null
[ { "commit_message": "[PATCH] Security fix for Cross-Site Scripting in apexcharts src/modules/legend/Legend.js | 2 +- src/modules/tooltip/Labels.js | 12 +++++++++--- src/utils/Utils.js | 25 +++++++++++++++++++------ 3 files changed, 29 insertions(+), 10 deletions(-)", "patch_text_b64": "RnJvbSA5...
null
CVE-2025-24961
Insecure path traversal in filesystem and filesystem-nio2 storage backends in org.gaul S3Proxy
org.gaul S3Proxy implements the S3 API and proxies requests. Users of the filesystem and filesystem-nio2 storage backends could unintentionally expose local files to users. This issue has been addressed in version 2.6.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
[ { "commit_message": "[PATCH] more validation for containerName and blobKey to avoid access escape .../internal/FilesystemBlobKeyValidatorImpl.java | 2 ++ .../internal/FilesystemContainerNameValidatorImpl.java | 2 ++ .../strategy/internal/FilesystemStorageStrategyImpl.java | 9 +++++++++ 3 files changed...
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2023-3490
SQL Injection in fossbilling/fossbilling
SQL Injection in GitHub repository fossbilling/fossbilling prior to 0.5.3.
[ { "commit_message": "[PATCH] Limit \"LIMIT\" to numbers only + Disable upload theme (#1392) * Prevent non numeric values being used in limits Potential abuse for Sql injection Only allow integers to be used Adjust exception * Disable upload assets via Theme pages File upload was removed in an earlier PR * Make...
CWE-89 Improper Neutralization of Special Elements used in an SQL Command
CVE-2024-37159
Evmos is missing create validator check
Evmos is the Ethereum Virtual Machine (EVM) Hub on the Cosmos Network. This vulnerability allowed a user to create a validator using vested tokens to deposit the self-bond. This vulnerability is fixed in 18.0.0.
[ { "commit_message": "[PATCH] Merge pull request from GHSA-pxv8-qhrh-jc7v * fix tests and add store migrations * add test case * backport changes * get tx receipt to check failed tx in nix test app/ante/cosmos/vesting.go | 123 --- app/ante/handler_options.go | 2 - app/app.g...
CWE-285: Improper Authorization
CVE-2025-3573
Versions of the package jquery-validation before 1.20.0 are vulnerable to Cross-site Scripting (XSS) in the showLabel() function, which may take input from a user-controlled placeholder value. This value will populate a message via $.validator.messages in a user localizable dictionary.
[ { "commit_message": "[PATCH] Core: Added escapeHtml option to avoid XSS attacks via showLabel methods (#2462) src/core.js | 15 ++++++++--- test/error-placement.js | 57 +++++++++++++++++++++++++++++++++++++++++ test/index.html | 6 +++++ 3 files changed, 75 insertions(+), 3 deletions(-)", ...
Cross-site Scripting (XSS)
CVE-2021-32693
Authentication granted with multiple firewalls
Symfony is a PHP framework for web and console applications and a set of reusable PHP components. A vulnerability related to firewall authentication is in Symfony starting with version 5.3.0 and prior to 5.3.2. When an application defines multiple firewalls, the token authenticated by one of the firewalls was available for all other firewalls. This could be abused when the application defines different providers for each part of the application, in such a situation, a user authenticated on a part of the application could be considered authenticated on the rest of the application. Starting in version 5.3.2, a patch ensures that the authenticated token is only available for the firewall that generates it.
[ { "commit_message": "[PATCH] Only trigger for the correct firewall in ContextListener::onKernelResponse() Firewall/ContextListener.php | 4 ++-- Tests/Firewall/ContextListenerTest.php | 6 +++--- 2 files changed, 5 insertions(+), 5 deletions(-)", "patch_text_b64": "RnJvbSAwNGM5ZDFhYzZhZjFlNTg2MWVkYW...
CWE-287: Improper Authentication
GHSA-49x3-8228-3w3m
Inefficient Regular Expression Complexity in code-server
null
[ { "commit_message": "[PATCH] [Security] Fix ReDoS Fix potential ReDoS src/node/util.ts | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBjYTYxN2RmMTM1ZTc4ODMzZjkzYzgzMjBjYjJkMmNmOGJiYTgwOWY1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiByZWFkeS1yZXNlYXJjaCA8NzI5MTYyMDkrcmVhZHktcmV...
null
GHSA-99g7-8xj5-crjx
null
[ { "commit_message": "[PATCH] CVE-2017-13006/L2TP: Check whether an AVP's content exceeds the AVP length. It's not good enough to check whether all the data specified by the AVP length was captured - you also have to check whether that length is large enough for all the required data in the AVP. This fixes a buf...
null
GHSA-v77v-qh6r-74qh
null
[ { "commit_message": "[PATCH] pppd: Remove passprompt plugin This is prompted by a number of factors: * It was more useful back in the dial-up days, but no-one uses dial-up any more * In many cases there will be no terminal accessible to the prompter program at the point where the prompter is run * The passwordf...
null
PYSEC-2021-621
null
[ { "commit_message": "[PATCH] Fix null pointer exception in shape inference function when tf.ragged.cross() is called with invalid inputs. PiperOrigin-RevId: 400045848 Change-Id: Ia65501583b85cf1ec14a252d83fbdd716817a516 tensorflow/core/ops/ragged_array_ops.cc | 7 ++++ .../python/ops/ragged/ragged_cross_o...
null
CVE-2022-23593
Segfault in `simplifyBroadcast` in Tensorflow
Tensorflow is an Open Source Machine Learning Framework. The `simplifyBroadcast` function in the MLIR-TFRT infrastructure in TensorFlow is vulnerable to a segfault (hence, denial of service), if called with scalar shapes. If all shapes are scalar, then `maxRank` is 0, so we build an empty `SmallVector`. The fix will be included in TensorFlow 2.8.0. This is the only affected version.
[ { "commit_message": "[PATCH] Avoid Segfault for scalar shapes. Calling tensor::FromElementsOp with an empty vector of elements and no type causes a segfault. We need to let the FromElementsOp know which scalar type it should have. Also add back the DynamicBroadcastInDimOp canonicalization patterns, which previo...
CWE-754: Improper Check for Unusual or Exceptional Conditions
GHSA-hxjg-2jvf-h3rx
Jenkins's build authorization token is stored and displayed in plain text
null
[ { "commit_message": "[PATCH] [SECURITY-783] .../hudson/model/BuildAuthorizationToken.java | 75 +++++++- .../BuildAuthorizationToken/config.jelly | 3 +- .../BuildAuthorizationTokenMigrationTest.java | 166 ++++++++++++++++++ .../jobs/job_without_token/config.xml | 17 ++ .../jobs/my_freestyle_job/...
null
GHSA-j527-v579-m98h
Improper authentication in zenml
null
[ { "commit_message": "[PATCH] Check old password during password change and add missing CLI commands (#2587) * Check old password during password change and add missing CLI commands * Fix docstrings * Ask to re-enter password during CLI password change * Auto-update of E2E template * Auto-update of LLM Finetunin...
null
CVE-2021-41231
OpenMage LTS DataFlow upload remote code execution vulnerability
OpenMage LTS is an e-commerce platform. Prior to versions 19.4.22 and 20.0.19, an administrator with the permissions to upload files via DataFlow and to create products was able to execute arbitrary code via the convert profile. Versions 19.4.22 and 20.0.19 contain a patch for this issue.
[ { "commit_message": "[PATCH] Merge pull request from GHSA-h632-p764-pjqm Co-authored-by: Mark Lewis <mark@netalico.com> .../Catalog/Model/Product/Attribute/Backend/Media.php | 6 ++++++ lib/Varien/Io/File.php | 9 ++++++++- 2 files changed, 14 insertions(+), 1 deletion(-)", ...
CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')
CVE-2023-2336
Path Traversal in pimcore/pimcore
Path Traversal in GitHub repository pimcore/pimcore prior to 10.5.21.
[ { "commit_message": "[PATCH] [Security] Admin Authenticated Arbitrary File Read (#14974) * Fix: disable asset importFromServer for users * Doc: Add Upgrade Notes .../AdminBundle/Controller/Admin/Asset/AssetController.php | 4 ++++ bundles/AdminBundle/Resources/public/js/pimcore/asset/tree.js | 2 +- .../23_Ins...
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
GHSA-r2xv-vpr2-42m9
slsa-verifier vulnerable to mproper validation of npm's publish attestations
null
[ { "commit_message": "[PATCH] fix: npm publish verification (#705) - adding support for IEEE P1363 formatted signatures - fix the npm publish attestation bug. The verification always return success, because it was not using PAE signature Signed-off-by: laurentsimon <laurentsimon@google.com> Signed-off-by: lauren...
null
GHSA-87j6-6jc2-h53q
null
[ { "commit_message": "[PATCH] scsi: ufs: ufs-mediatek: Fix error checking in ufs_mtk_init_va09_pwr_ctrl() The function regulator_get() returns an error pointer. Use IS_ERR() to validate the return value. Link: https://lore.kernel.org/r/20211222070930.9449-1-linmq006@gmail.com Fixes: cf137b3ea49a (\"scsi: ufs-med...
null
CVE-2024-10109
Incorrect Authorization in mintplex-labs/anything-llm
A vulnerability in the mintplex-labs/anything-llm repository, as of commit 5c40419, allows low privilege users to access the sensitive API endpoint "/api/system/custom-models". This access enables them to modify the model's API key and base path, leading to potential API key leakage and denial of service on chats.
[ { "commit_message": "[PATCH] Patch custom models endpoint (#2903) * prevent non admin users from changing llm settings via custom-models endpoint * permission middleware to JSDOC Co-authored-by: timothycarambat <rambat1010@gmail.com> server/endpoints/system.js | 2 +- server/utils/middleware/...
CWE-863 Incorrect Authorization
GHSA-954c-jjx6-cxv7
Reflected XSS from the callback handler's error query parameter
null
[ { "commit_message": "[PATCH 1/2] Fix reflected XSS from the callback handler's error query parameter README.md | 17 +++++++++++++++++ src/auth0-session/handlers/callback.ts | 14 +++++++++++++- tests/auth0-session/handlers/callback.test.ts | 10 +++++++++- tests/handlers...
null
GHSA-7rqh-6ccp-gvhv
null
[ { "commit_message": "[PATCH] xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present If using a kernel with CONFIG_XFS_RT=y and we set the RHINHERIT flag on a directory in a filesystem that does not have a realtime device and create a new file in that directory, it gets marked as a real time file. ...
null
CVE-2018-20856
An issue was discovered in the Linux kernel before 4.18.7. In block/blk-core.c, there is an __blk_drain_queue() use-after-free because a certain error case is mishandled.
[ { "commit_message": "[PATCH] block: blk_init_allocated_queue() set q->fq as NULL in the fail case We find the memory use-after-free issue in __blk_drain_queue() on the kernel 4.14. After read the latest kernel 4.18-rc6 we think it has the same problem. Memory is allocated for q->fq in the blk_init_allocated_que...
n/a
GHSA-wjp8-5g4j-4rjj
null
[ { "commit_message": "[PATCH] replace `is_header()` check pattern the original pattern exhibits can take indeterminate time on long input strings. The semantics of: '(%S+):%s*(%S+)' can be described as: \"at least one non-space, followed by a colon, optional whitespace and at least one non-space\". but the capt...
null
GHSA-73qw-6rjv-mchr
null
[ { "commit_message": "[PATCH] *) SECURITY: CVE-2015-0228 (cve.mitre.org) mod_lua: A maliciously crafted websockets PING after a script calls r:wsupgrade() can cause a child process crash. [Edward Lu <Chaosed0 gmail.com>] Discovered by Guido Vranken <guidovranken gmail.com> Submitted by: Edward L...
null
GHSA-g32p-2jpf-2cg9
null
[ { "commit_message": "[PATCH] writet1 protection against buffer overflow git-svn-id: svn://tug.org/texlive/trunk/Build/source@48697 c570f23f-e606-0410-a88d-b1316a301751 texk/dvipsk/ChangeLog | 5 +++++ texk/dvipsk/writet1.c | 2 ++ texk/web2c/luatexdir/ChangeLog | 4 ++++ texk/web2c...
null
CVE-2023-5595
Denial of Service in gpac/gpac
Denial of Service in GitHub repository gpac/gpac prior to 2.3.0-DEV.
[ { "commit_message": "[PATCH] fixes #2633 - 3 segv + memleak src/filters/isoffin_load.c | 11 ++++------- src/filters/mux_isom.c | 19 +++++++++---------- src/isomedia/media.c | 4 +++- src/isomedia/tx3g.c | 21 +++++++++++++-------- 4 files changed, 29 insertions(+), 26 deletions(-)", "patch_t...
CWE-400 Uncontrolled Resource Consumption
GHSA-5xq3-7mw9-wj5p
Cross Site Scripting in thorsten/phpmyfaq
null
[ { "commit_message": "[PATCH] fix: added missing conversion to HTML entities phpmyfaq/src/phpMyFAQ/Tags.php | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-)", "patch_text_b64": "RnJvbSA1MTRmNGRmMmFkOTE4ZTY5NTc1MDI4ZDU4YjJlMzNhYWY1MzZlNTliIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBUaG9yc3RlbiBS...
null
CVE-2020-26272
Electron vulnerable to ID collision when routing IPC messages to renderers containing OOPIFs
The Electron framework lets users write cross-platform desktop applications using JavaScript, HTML and CSS. In versions of Electron IPC prior to 9.4.0, 10.2.0, 11.1.0, and 12.0.0-beta.9, messages sent from the main process to a subframe in the renderer process, through webContents.sendToFrame, event.reply or when using the remote module, can in some cases be delivered to the wrong frame. If your app uses remote, calls webContents.sendToFrame, or calls event.reply in an IPC message handler then it is impacted by this issue. This has been fixed in versions 9.4.0, 10.2.0, 11.1.0, and 12.0.0-beta.9. There are no known workarounds for this issue.
[ { "commit_message": "[PATCH] fix: restrict sendToFrame to same-process frames by default (#26875) docs/api/structures/ipc-main-event.md | 1 + docs/api/structures/ipc-main-invoke-event.md | 1 + docs/api/web-contents.md | 2 +- lib/browser/api/web-contents.ts | 19 +++...
CWE-668: Exposure of Resource to Wrong Sphere
CVE-2025-54074
Cherry Studio is Vulnerable to OS Command Injection during Connection with a Malicious MCP Server
Cherry Studio is a desktop client that supports for multiple LLM providers. From versions 1.2.5 to 1.5.1, Cherry Studio is vulnerable to OS Command Injection during a connection with a malicious MCP server in HTTP Streamable mode. Attackers can setup a malicious MCP server with compatible OAuth authorization server endpoints and trick victims into connecting it, leading to OS command injection in vulnerable clients. This issue has been patched in version 1.5.2.
[ { "commit_message": "[PATCH] =?UTF-8?q?refactor:=20Unified=20Logger=20/=20=E7=BB=9F?= =?UTF-8?q?=E4=B8=80=E6=97=A5=E5=BF=97=E7=AE=A1=E7=90=86=20(#8207)?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit * Revert \"feat: optimize minapp cache with LRU (#8160)\" This rever...
CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
GHSA-jwhx-xcg6-8xhj
In aiohttp, compressed files as symlinks are not protected from path traversal
null
[ { "commit_message": "[PATCH] [PR #8652/b0536ae6 backport][3.10] Do not follow symlinks for compressed file variants (#8653) Co-authored-by: J. Nick Koston <nick@koston.org> CHANGES/8652.bugfix.rst | 1 + aiohttp/web_fileresponse.py | 5 ++++- tests/test_web_sendfile.py | 14 +++++++------- tests...
null
GHSA-92hm-c572-wrpc
null
[ { "commit_message": "[PATCH] Fixed: wflow-core - User Profile Menu - Prevent XSS. T1604 @7.0-SNAPSHOT .../java/org/joget/plugin/enterprise/UserProfileMenu.java | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSA5YTc3ZjUwOGEyYmY4Y2Y2NjFkNTg4ZjM3YTRjYzI5ZWNhZWE0ZmM4IE1vbi...
null
CVE-2024-45390
@blakeembrey/template vulnerable to code injection when attacker controls template input
@blakeembrey/template is a string template library. Prior to version 1.2.0, it is possible to inject and run code within the template if the attacker has access to write the template name. Version 1.2.0 contains a patch. As a workaround, don't pass untrusted input as the template display name, or don't use the display name feature.
[ { "commit_message": "[PATCH] Remove template display name src/index.ts | 11 ++++------- 1 file changed, 4 insertions(+), 7 deletions(-)", "patch_text_b64": "RnJvbSBiOGQ5YWE5OTllNDY0ODE2YzZjZmIxNGFjZDFhZDBmNWQxZTMzNWFhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBCbGFrZSBFbWJyZXkgPGhlbGxvQGJsYWtlZW1icmV5LmNvbT4...
CWE-94: Improper Control of Generation of Code ('Code Injection')
CVE-2023-32068
URL Redirection to Untrusted Site in XWiki
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In versions prior to 14.10.4 it's possible to exploit well known parameters in XWiki URLs to perform redirection to untrusted site. This vulnerability was partially fixed in the past for XWiki 12.10.7 and 13.3RC1 but there is still the possibility to force specific URLs to skip some checks, e.g. using URLs like `http:example.com` in the parameter would allow the redirect. The issue has now been patched against all patterns that are known for performing redirects. This issue has been patched in XWiki 14.10.4 and 15.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
[ { "commit_message": "[PATCH] XWIKI-19994: False positive redirect checking .../xpn/xwiki/web/XWikiServletResponse.java | 9 +- .../xwiki/web/XWikiServletResponseTest.java | 123 ++++++++++++++++++ 2 files changed, 131 insertions(+), 1 deletion(-) create mode 100644 xwiki-platform-core/xwiki-platform-oldcore...
CWE-601: URL Redirection to Untrusted Site ('Open Redirect')
GHSA-q25h-jch8-gfrp
Concrete CMS vulnerable to stored XSS via the Role Name field
null
[ { "commit_message": "[PATCH 1/4] Fix H1 2337524 concrete/controllers/backend/file.php | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-)", "patch_text_b64": "RnJvbSA2NjVkMWJmZmI1YjBiZGU0ZWQ2ZTgxZWQyMGVmYzA2OGIxZTE2ZjU2IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBbmRyZXcgRW1ibGVyIDxhbmRyZXdAY29uY...
null
CVE-2019-19058
A memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering alloc_page() failures, aka CID-b4b814fec1a5.
[ { "commit_message": "[PATCH] iwlwifi: dbg_ini: fix memory leak in alloc_sgtable In alloc_sgtable if alloc_page fails, the alocated table should be released. Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com> Signed-off-by: Luca Coelho <luciano.coelho@intel.com> drivers/net/wireless/intel/iwlwifi/fw/dbg....
n/a
GHSA-p45v-v4pw-77jr
Division by 0 in `QuantizedBatchNormWithGlobalNormalization`
null
[ { "commit_message": "[PATCH] Add missing validation in `QuantizedBatchNormWithGlobalNormalization` PiperOrigin-RevId: 370123451 Change-Id: Id234d6dab1ec21230bb8e503dba30f899af87f33 .../core/kernels/quantized_batch_norm_op.cc | 77 ++++++++++++++++--- 1 file changed, 67 insertions(+), 10 deletions(-)", "pat...
null
GHSA-5h7w-hmxc-99g5
Cross site scripting in safe-svg
null
[ { "commit_message": "[PATCH] Instead of relying on the file type that comes from the file array, use a core WordPress function to determine this, to avoid any issues around spoofing the content-type safe-svg.php | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA0NDc1MmNmMG...
null
CVE-2023-4508
Denial of Service in Gerbv
A user able to control file input to Gerbv, between versions 2.4.0 and 2.10.0, can cause a crash and cause denial-of-service with a specially crafted Gerber RS-274X file.
[ { "commit_message": "[PATCH] fix: Out-of-bounds memory access of filename. Put all the filename allocation and deallocation into the `gerb_fopen` and `gerb_fclose` functions so that the caller doesn't need to deal with this anymore. Also, free includeFilename. It was allocated as part of `gerb_fgetstring()` ab...
CWE-824 Access of Uninitialized Pointer
CVE-2021-3325
Monitorix 3.13.0 allows remote attackers to bypass Basic Authentication in a default installation (i.e., an installation without a hosts_deny option). This issue occurred because a new access-control feature was introduced without considering that some exiting installations became unsafe, upon an update to 3.13.0, unless the new feature was immediately configured.
[ { "commit_message": "[PATCH] fixed a security bug introduced in 3.13.0 version that lead the HTTP built-in server to bypass Basic Authentication when the option 'hosts_deny' is not defined #309 lib/HTTPServer.pm | 4 ++++ 1 file changed, 4 insertions(+)", "patch_text_b64": "RnJvbSBkNjgxNmUyMGRhMWE5OGJjZGM2Mz...
n/a
CVE-2022-39250
Matrix JavaScript SDK vulnerable to key/device identifier confusion in SAS verification
Matrix JavaScript SDK is the Matrix Client-Server software development kit (SDK) for JavaScript. Prior to version 19.7.0, an attacker cooperating with a malicious homeserver could interfere with the verification flow between two users, injecting its own cross-signing user identity in place of one of the users’ identities. This would lead to the other device trusting/verifying the user identity under the control of the homeserver instead of the intended one. The vulnerability is a bug in the matrix-js-sdk, caused by checking and signing user identities and devices in two separate steps, and inadequately fixing the keys to be signed between those steps. Even though the attack is partly made possible due to the design decision of treating cross-signing user identities as Matrix devices on the server side (with their device ID set to the public part of the user identity key), no other examined implementations were vulnerable. Starting with version 19.7.0, the matrix-js-sdk has been modified to double check that the key signed is the one that was verified instead of just referencing the key by ID. An additional check has been made to report an error when one of the device ID matches a cross-signing key. As this attack requires coordination between a malicious homeserver and an attacker, those who trust their homeservers do not need a particular workaround.
[ { "commit_message": "[PATCH] Resolve multiple CVEs CVE-2022-39249 CVE-2022-39250 CVE-2022-39251 CVE-2022-39236 spec/integ/matrix-client-crypto.spec.ts | 6 + spec/integ/matrix-client-syncing.spec.ts | 2 + spec/integ/megolm-integ.spec.ts | 317 ++++++++++- spec/unit/content-helpers.spe...
CWE-322: Key Exchange without Entity Authentication
CVE-2018-25066
PeterMu nodebatis sql injection
A vulnerability was found in PeterMu nodebatis up to 2.1.x. It has been classified as critical. Affected is an unknown function. The manipulation leads to sql injection. Upgrading to version 2.2.0 is able to address this issue. The patch is identified as 6629ff5b7e3d62ad8319007a54589ec1f62c7c35. It is recommended to upgrade the affected component. VDB-217554 is the identifier assigned to this vulnerability.
[ { "commit_message": "[PATCH] fix bug of sql injection in sqlBuilder dist/lib/pool.js | 12 +- dist/lib/sqlBuilder.js | 18 +- dist/nodebatis.js | 34 +- package-lock.json | 3537 +++++++++++++++++++++++++++++++++++ package.json | 3 +- src/lib/sqlBuilder.js...
CWE-89 SQL Injection
GHSA-66gw-5xpf-gfp5
Improper Neutralization of Input During Web Page Generation in IPython
null
[ { "commit_message": "[PATCH 1/3] Add APIHandler base class - ensures all API responses are json - sets CSP to prevent js execution on all API replies IPython/html/base/handlers.py | 15 ++++++++++++--- IPython/html/services/clusters/handlers.py | 8 ++++---- IPython/html/services/config/handle...
null
GHSA-h55h-wq7v-r6qm
null
[ { "commit_message": "[PATCH] API Restrict MemberLoginForm to POST requests for increased security CVE-2013-2653 - Thanks to Fara Rustein of Deloitte Argentina for reporting. security/MemberLoginForm.php | 3 +++ 1 file changed, 3 insertions(+)", "patch_text_b64": "RnJvbSAzZTg4Yzk4Y2E1MTM4ODBlMmI0M2VkN2YyN2Fk...
null
CVE-2025-68158
Authlib: 1-click Account Takeover
Authlib is a Python library which builds OAuth and OpenID Connect servers. In version 1.6.5 and prior, cache-backed state/request-token storage is not tied to the initiating user session, so CSRF is possible for any attacker that has a valid state (easily obtainable via an attacker-initiated authentication flow). When a cache is supplied to the OAuth client registry, FrameworkIntegration.set_state_data writes the entire state blob under _state_{app}_{state}, and get_state_data ignores the caller’s session altogether. This issue has been patched in version 1.6.6.
[ { "commit_message": "[PATCH] Merge commit from fork .../base_client/framework_integration.py | 25 +++++----- tests/clients/test_flask/test_oauth_client.py | 49 +++++++++++++++++-- 2 files changed, 59 insertions(+), 15 deletions(-)", "patch_text_b64": "RnJvbSAyODA4Mzc4NjExZGQ2ZmIyNTMyYjE4OWE5MDg3ODc3ZDh...
CWE-352: Cross-Site Request Forgery (CSRF)
GHSA-g5hj-fh2h-5x5v
null
[ { "commit_message": "[PATCH] Fix bug if using an undefined member of an object for for..in (fix #1437) ChangeLog | 1 + src/jsparse.c | 29 ++++++++++++----------------- 2 files changed, 13 insertions(+), 17 deletions(-)", "patch_text_b64": "RnJvbSBiZjQ0MTZhYjkxMjllZTNhZmQ1NjczOWVhNGUzY2QwZGE1NDg0YjZiIE1...
null
GHSA-rv9w-mxpp-hwhj
null
[ { "commit_message": "[PATCH] can: bcm: delay release of struct bcm_op after synchronize_rcu() can_rx_register() callbacks may be called concurrently to the call to can_rx_unregister(). The callbacks and callback data, though, are protected by RCU and the struct sock reference count. So the callback data is real...
null
CVE-2025-61782
Open Redirect in OpenCTI's SAML Authentication Flow
OpenCTI is an open source platform for managing cyber threat intelligence knowledge and observables. Prior to version 6.8.3, an open redirect vulnerability exists in the OpenCTI platform's SAML authentication endpoint (/auth/saml/callback). By manipulating the RelayState parameter, an attacker can force the server to issue a 302 redirect to any external URL, enabling phishing, credential theft, and arbitrary site redirection. This issue has been patched in version 6.8.3.
[ { "commit_message": "[PATCH] [Backend] Improved RelayState and referer verification (#12542) Co-authored-by: Angelique <angelique.jard@filigran.io> .../opencti-graphql/src/http/httpPlatform.js | 20 ++++- .../tests/01-unit/http/httpPlatform-test.ts | 84 +++++++++++++++++++ 2 files changed, 101 insertions(+), ...
CWE-601: URL Redirection to Untrusted Site ('Open Redirect')
GHSA-vj5p-v2jp-m9w5
null
[ { "commit_message": "[PATCH] Ensure we secure hawtio-karaf-terminal's /term context hawtio-karaf-terminal/pom.xml | 6 +++ .../KarafTerminalContextListener.java | 38 +++++++++++++++++ .../karaf/terminal/TerminalServlet.java | 29 ++++++++++++- .../src/main/webapp/WEB-INF/web.xml ...
null
CVE-2022-36086
linked_list_allocator vulnerable to out-of-bound writes on `Heap` initialization and `Heap::extend`
linked_list_allocator is an allocator usable for no_std systems. Prior to version 0.10.2, the heap initialization methods were missing a minimum size check for the given heap size argument. This could lead to out-of-bound writes when a heap was initialized with a size smaller than `3 * size_of::<usize>` because of metadata write operations. This vulnerability impacts all the initialization functions on the `Heap` and `LockedHeap` types, including `Heap::new`, `Heap::init`, `Heap::init_from_slice`, and `LockedHeap::new`. It also affects multiple uses of the `Heap::extend` method. Version 0.10.2 contains a patch for the issue. As a workaround, ensure that the heap is only initialized with a size larger than `3 * size_of::<usize>` and that the `Heap::extend` method is only called with sizes larger than `2 * size_of::<usize>()`. Also, ensure that the total heap size is (and stays) a multiple of `2 * size_of::<usize>()`.
[ { "commit_message": "[PATCH 01/10] Add additional checks to `Heap::extend` to prevent out-of-bounds writes src/hole.rs | 28 +++++++++++++++++++++++++++- src/lib.rs | 48 ++++++++++++++++++++++++++++++++++++++++++------ 2 files changed, 69 insertions(+), 7 deletions(-)", "patch_text_b64": "RnJvbSBjMzU1OGQyYT...
CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
GHSA-r2wf-q3x4-hrv9
Default development error handler in Ratpack is vulnerable to HTML content injection (XSS)
null
[ { "commit_message": "[PATCH] Escape user input rendered to the response in the development error handler. .../error/internal/ErrorPageRenderer.java | 6 ++++- .../error/DevelopmentErrorHandlerSpec.groovy | 26 +++++++++++++++++++ 2 files changed, 31 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJv...
null
CVE-2020-36564
Improper input validation in github.com/justinas/nosurf
Due to improper validation of caller input, validation is silently disabled if the provided expected token is malformed, causing any user supplied token to be considered valid.
[ { "commit_message": "[PATCH 1/2] Do not ignore decoding errors and other special cases token.go | 12 +++++++++--- token_test.go | 13 +++++++++++++ 2 files changed, 22 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSBlZTc2OTFmODJlN2RlYWY0NTBiYjAyOTIyN2U0ODFjZmJiZGJmYjdkIE1vbiBTZXAgMTcgMDA6MDA6M...
CWE 345: Insufficient Verification of Data Authenticity
CVE-2022-0695
Denial of Service in radareorg/radare2
Denial of Service in GitHub repository radareorg/radare2 prior to 5.6.4.
[ { "commit_message": "[PATCH] Fix DoS in PE/QNX/DYLDCACHE/PSX parsers ##crash * Reported by lazymio * Reproducer: AAA4AAAAAB4= libr/bin/format/pe/pe.c | 18 ++++++++---------- libr/bin/p/bin_dyldcache.c | 2 +- libr/bin/p/bin_psxexe.c | 4 ++-- libr/bin/p/bin_qnx.c | 14 +++++++------- libr/util/buf.c ...
CWE-400 Uncontrolled Resource Consumption
CVE-2015-5239
Integer overflow in the VNC display driver in QEMU before 2.1.0 allows attachers to cause a denial of service (process crash) via a CLIENT_CUT_TEXT message, which triggers an infinite loop.
[ { "commit_message": "[PATCH] ui/vnc: limit client_cut_text msg payload size currently a malicious client could define a payload size of 2^32 - 1 bytes and send up to that size of data to the vnc server. The server would allocated that amount of memory which could easily create an out of memory condition. This p...
Integer Overflow
CVE-2017-14223
In libavformat/asfdec_f.c in FFmpeg 3.3.3, a DoS in asf_build_simple_index() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted ASF file, which claims a large "ict" field in the header but does not contain sufficient backing data, is provided, the for loop would consume huge CPU and memory resources, since there is no EOF check inside the loop.
[ { "commit_message": "[PATCH] avformat/asfdec: Fix DoS in asf_build_simple_index() Fixes: Missing EOF check in loop No testcase Found-by: Xiaohei and Wangchu from Alibaba Security Team Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> libavformat/asfdec_f.c | 5 +++++ 1 file changed, 5 insertions(+)", ...
n/a
GHSA-66j8-c83m-gj5f
Apache Zeppelin remote code execution by adding malicious JDBC connection string
null
[ { "commit_message": "[PATCH] [ZEPPELIN-5990] Disable sensitive configuration for JDBC url (#4709) * [ZEPPELIN-5990] Disable sensitive configuration for JDBC url * [ZEPPELIN-5990] Disable sensitive configuration for JDBC url .../apache/zeppelin/jdbc/JDBCInterpreter.java | 23 ++++++++++++++++++- .../zeppelin/jdbc...
null
CVE-2021-4309
01-Scripts 01ACP cross site scripting
A vulnerability, which was classified as problematic, has been found in 01-Scripts 01ACP. This issue affects some unknown processing. The manipulation of the argument $_SERVER['SCRIPT_NAME'] leads to cross site scripting. The attack may be initiated remotely. The identifier of the patch is a16eb7da46ed22bc61067c212635394f2571d3c4. It is recommended to apply a patch to fix this issue. The identifier VDB-217649 was assigned to this vulnerability.
[ { "commit_message": "[PATCH] Hotfix: XSS-Vulnerability $_SERVER['PHP_SELF'] https://seancoates.com/blogs/xss-woes 01acp/_dev.php | 2 +- 01acp/_loader.php | 2 +- 01acp/acp.php | 2 +- 01acp/comments.php | 4 ++-- 01acp/filemanager.php | 2 +- 01acp/index.php | 2 +...
CWE-79 Cross Site Scripting
CVE-2013-10011
aeharding classroom-engagement-system sql injection
A vulnerability was found in aeharding classroom-engagement-system and classified as critical. Affected by this issue is some unknown functionality. The manipulation leads to sql injection. The attack may be launched remotely. The name of the patch is 096de5815c7b414e7339f3439522a446098fb73a. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-218156.
[ { "commit_message": "<aeharding@gmail.com@c1766da9-1b19-9a88-3601-8d11d65f8203> [PATCH] real_escape_string() to prevent SQL injections on database. Removed old welcomeEmail.php webserver/img/Thumbs.db | Bin 81408 -> 86016 bytes webserver/student/index.php | 9 ++++++++- webserver/teacher/cr...
CWE-89 SQL Injection
PYSEC-2016-2
null
[ { "commit_message": "[PATCH] [1.9.x] Fixed XSS in admin's add/change related popup. This is a security fix. .../static/admin/js/admin/RelatedObjectLookups.js | 2 +- django/views/debug.py | 4 ++-- docs/releases/1.8.14.txt | 15 +++++++++++++-- docs/releases/1...
null
GHSA-2vx6-fcw6-hpr6
Reference counting error in pyo3
null
[ { "commit_message": "[PATCH] py: fix reference count bug in From(Py<T>) for PyObject src/instance.rs | 14 ++++++++++++-- 1 file changed, 12 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA4ZjgxZjU5NWRkNzcwYjU4NmM3Y2E3MTk1YjQyMDA0YTZjOTc2ZWI5IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBEYXZpZCBIZXdpd...
null
GHSA-qwvf-9vg7-643x
null
[ { "commit_message": "[PATCH] EAP-pwd: fix side-channel leak where 1 in 2018 handshakes fail Previously the Hunting and Pecking algorithm of EAP-pwd aborted when more than 10 iterations are needed. Every iteration has a 50% chance of finding the password element. This means one in every 2048 handshakes will fail...
null
CVE-2023-32305
aiven-extras PostgreSQL Privilege Escalation Through Overloaded Search Path
aiven-extras is a PostgreSQL extension. Versions prior to 1.1.9 contain a privilege escalation vulnerability, allowing elevation to superuser inside PostgreSQL databases that use the aiven-extras package. The vulnerability leverages missing schema qualifiers on privileged functions called by the aiven-extras extension. A low privileged user can create objects that collide with existing function names, which will then be executed instead. Exploiting this vulnerability could allow a low privileged user to acquire `superuser` privileges, which would allow full, unrestricted access to all data and database functions. And could lead to arbitrary code execution or data access on the underlying host as the `postgres` user. The issue has been patched as of version 1.1.9.
[ { "commit_message": "[PATCH] Qualify function calls with pg_catalog schema The security definer functions `aiven_extras.pg_create_publication` and `aiven_extras.set_pgaudit_parameter` are missing explicit `pg_catalog` schema qualifications for array and string function calls such as `array_length`, `format`, an...
CWE-20: Improper Input Validation
CVE-2021-32662
TechDocs mkdocs.yml path traversal
Backstage is an open platform for building developer portals, and techdocs-common contains common functionalities for Backstage's TechDocs. In `@backstage/techdocs-common` versions prior to 0.6.3, a malicious actor could read sensitive files from the environment where TechDocs documentation is built and published by setting a particular path for `docs_dir` in `mkdocs.yml`. These files would then be available over the TechDocs backend API. This vulnerability is mitigated by the fact that an attacker would need access to modify the `mkdocs.yml` in the documentation source code, and would also need access to the TechDocs backend API. The vulnerability is patched in the `0.6.3` release of `@backstage/techdocs-common`.
[ { "commit_message": "[PATCH] Add validation to prevent docs_dir from being an absolute path * Adds a new validation function to helpers to prevent generation when mkdocs.yml is not present or is invalid * Handles vulnerability where docs_dir can be put in as an absolute path which copies and exposes the files f...
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2019-20922
Handlebars before 4.4.5 allows Regular Expression Denial of Service (ReDoS) because of eager matching. The parser may be forced into an endless loop while processing crafted templates. This may allow attackers to exhaust system resources.
[ { "commit_message": "[PATCH] fix: non-eager matching raw-block-contents In 4.4.4 the block-contents was matched with an eager match, which means that with multiple raw-blocks of the same kind, the block was spanned over the first ending-tag until the last one. This commit replaces this by a non-eager match. clo...
n/a
PYSEC-2025-23
null
[ { "commit_message": "[PATCH] [core] Redact redis password in log (#50409) <!-- Thank you for your contribution! Please review https://github.com/ray-project/ray/blob/master/CONTRIBUTING.rst before opening a pull request. --> <!-- Please add a reviewer to the assignee section when you create a PR. If you don't h...
null
GHSA-x43g-x8g8-q2qc
null
[ { "commit_message": "[PATCH] fix minor infoleak in get_user_ex() get_user_ex(x, ptr) should zero x on failure. It's not a lot of a leak (at most we are leaking uninitialized 64bit value off the kernel stack, and in a fairly constrained situation, at that), but the fix is trivial, so... Cc: stable@vger.kernel.o...
null
CVE-2012-3412
The sfc (aka Solarflare Solarstorm) driver in the Linux kernel before 3.2.30 allows remote attackers to cause a denial of service (DMA descriptor consumption and network-controller outage) via crafted TCP packets that trigger a small MSS value.
[ { "commit_message": "[PATCH] sfc: Fix maximum number of TSO segments and minimum TX queue size [ Upstream commit 7e6d06f0de3f74ca929441add094518ae332257c ] Currently an skb requiring TSO may not fit within a minimum-size TX queue. The TX queue selected for the skb may stall and trigger the TX watchdog repeated...
n/a
GHSA-7f85-6p7j-xw53
null
[ { "commit_message": "[PATCH] Avoid people to alter other projects by changing form data ChangeLog | 4 + app/Controller/ActionController.php | 5 +- app/Controller/ActionCreationController.php | 7 +- app/Controller/BaseController.php | 90 ++++++++++++++++++++...
null
GHSA-9c8h-2mv3-49ww
Division by 0 in most convolution operators
null
[ { "commit_message": "[PATCH] Prevent division by 0 in common shape functions. PiperOrigin-RevId: 387712197 Change-Id: Id25c7460e35b68aeeeac23b9a88e455b443ee149 tensorflow/core/framework/common_shape_fns.cc | 11 +++++++++++ 1 file changed, 11 insertions(+)", "patch_text_b64": "RnJvbSA4YTc5M2I1ZDdmNTllMzdhYzd...
null
CVE-2016-4913
The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel before 4.5.5 mishandles NM (aka alternate name) entries containing \0 characters, which allows local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem.
[ { "commit_message": "[PATCH] get_rock_ridge_filename(): handle malformed NM entries Payloads of NM entries are not supposed to contain NUL. When we run into such, only the part prior to the first NUL goes into the concatenation (i.e. the directory entry name being encoded by a bunch of NM entries). We do stop...
n/a
CVE-2025-3108
Unsafe Deserialization in JsonPickleSerializer Enables Remote Code Execution in run-llama/llama_index
A critical deserialization vulnerability exists in the run-llama/llama_index library's JsonPickleSerializer component, affecting versions v0.12.27 through v0.12.40. This vulnerability allows remote code execution due to an insecure fallback to Python's pickle module. JsonPickleSerializer prioritizes deserialization using pickle.loads(), which can execute arbitrary code when processing untrusted data. Attackers can exploit this by crafting malicious payloads to achieve full system compromise. The root cause includes an insecure fallback mechanism, lack of validation or safeguards, misleading design, and violation of Python security guidelines.
[ { "commit_message": "[PATCH] Adding warning in the docstring of JsonPickleSerializer for the user to deserialize only safe things (#18943) * adding warning in the docstring of JsonPickleSerializer for the user to deserialize only safe things * renaming to PickleSerializer .../llama_index/core/workflow/context_s...
CWE-1112 Incomplete Documentation of Program Execution
CVE-2020-24612
An issue was discovered in the selinux-policy (aka Reference Policy) package 3.14 through 2020-08-24 because the .config/Yubico directory is mishandled. Consequently, when SELinux is in enforced mode, pam-u2f is not allowed to read the user's U2F configuration file. If configured with the nouserok option (the default when configured by the authselect tool), and that file cannot be read, the second factor is disabled. An attacker with only the knowledge of the password can then log in, bypassing 2FA.
[ { "commit_message": "[PATCH] Add file context for ~/.config/Yubico Add file context specification for ~/.config/Yubico in addition to existing ~/.yubico. Update the auth_filetrans_home_content() and auth_filetrans_admin_home_content() interfaces accordingly. Resolves: rhbz#1860888 policy/modules/system/authlogi...
n/a
GHSA-mc8v-mgrf-8f4m
Clarify Content-Type handling
null
[ { "commit_message": "[PATCH] spec: clarify handling regarding Content-type header Signed-off-by: Vincent Batts <vbatts@hashbangbash.com> spec.md | 15 +++++++++++++-- 1 file changed, 13 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBhYzI4Y2FjMDU1N2JjZDMwODQ3MTRhYjA5ZjlmMjM1NmZlNTA0OTIzIE1vbiBTZXAg...
null
GHSA-hm3x-jwwf-jpr9
Exposure of Sensitive Information to an Unauthorized Actor in OpenStack tripleo-heat-templates
null
[ { "commit_message": "[PATCH] Use public endpoint for [keystone_authtoken] www_authenticate_uri According to the parameter description, www_authenticate_uri should be complete public Identity endpoint, which is accessible by all end users. This change replaces internal endpoint by public endpoint to meet that re...
null
GHSA-p665-3xc8-4hrv
null
[ { "commit_message": "[PATCH] Implemented measures to prevent memory leaks in sn_coap_parser_options_parse(). Added a helper uint16_t addition function with overflow detection. The function is used when calculating the extended length and option delta. The overlow detection is needed to avoid wrap-around of opti...
null
CVE-2015-8702
The DNS::GetResult function in dns.cpp in InspIRCd before 2.0.19 allows remote DNS servers to cause a denial of service (netsplit) via an invalid character in a PTR response, as demonstrated by a "\032" (whitespace) character in a hostname.
[ { "commit_message": "[PATCH] Reject replies to DNS PTR requests that contain invalid characters Fixes issue #1033 reported by @ping86 src/dns.cpp | 8 ++++++++ 1 file changed, 8 insertions(+)", "patch_text_b64": "RnJvbSA2MDU4NDgzZDlmYmMxYjkwNGQ1YWU3Y2ZlYTQ3YmZjZGU1YzViNTU5IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpG...
n/a