id
stringlengths
12
19
title
stringlengths
0
237
description
stringlengths
35
3.87k
patches
listlengths
1
22
cwe
stringlengths
2
440
GHSA-q99p-78hp-xg5c
Graphite Web Cross-site Scripting vulnerability
null
[ { "commit_message": "[PATCH] Fix XSS in some dashboards queries (#2785) * prevent xss on time range text fields * prevent xss on dashbord queries webapp/content/js/dashboard.js | 16 ++++++++++------ webapp/graphite/dashboard/views.py | 20 ++++++++++++++++++++ webapp/graphite/errors.py | 23 +++++++...
null
CVE-2022-41898
`CHECK` fail via inputs in `SparseFillEmptyRowsGrad` in Tensorflow
TensorFlow is an open source platform for machine learning. If `SparseFillEmptyRowsGrad` is given empty inputs, TensorFlow will crash. We have patched the issue in GitHub commit af4a6a3c8b95022c351edae94560acc61253a1b8. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.
[ { "commit_message": "[PATCH] Fix empty input crash for SparseFillEmptyRowsGrad. PiperOrigin-RevId: 478085721 .../sparse_fill_empty_rows_op_gpu.cu.cc | 43 +++++++++++-------- .../sparse_ops/sparse_ops_test.py | 7 +++ 2 files changed, 33 insertions(+), 17 deletions(-)", "patch_text_b64": "R...
CWE-20: Improper Input Validation
CVE-2025-58769
auth0-PHP: Improper File Type Handling in Bulk User Import
auth0-PHP is an SDK for Auth0 Authentication and Management APIs. In versions 3.3.0 through 8.16.0, the Bulk User Import endpoint in applications built with the SDK does not validate the file-path wrapper or value. Without proper validation, affected applications may accept arbitrary file paths or URLs. The vulnerability affects any application that either directly uses the Auth0-PHP SDK (versions 3.3.0–8.16.0) or indirectly relies on those versions through the Auth0/symfony, Auth0/laravel-auth0, or Auth0/wordpress SDKs. This issue is fixed in version 8.17.0.
[ { "commit_message": "[PATCH] fix: Enhance file validation in HttpRequest to prevent arbitrary file read vulnerabilities src/Utility/Assert.php | 9 +++++ src/Utility/HttpRequest.php | 3 ++ tests/Unit/Utility/HttpRequestTest.php | 50 ++++++++++++++++++++++++++ 3 files changed, 62 inse...
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
GHSA-7cc2-r658-7xpf
Coder's OIDC authentication allows email with partially matching domain to register
null
[ { "commit_message": "[PATCH] Merge pull request from GHSA-7cc2-r658-7xpf This fixes a vulnerability with the `CODER_OIDC_EMAIL_DOMAIN` option, where users with a superset of the allowed email domain would be allowed to login. For example, given `CODER_OIDC_EMAIL_DOMAIN=google.com`, a user would be permitted ent...
null
CVE-2020-4040
CSRF issue on preview pages in Bolt CMS
Bolt CMS before version 3.7.1 lacked CSRF protection in the preview generating endpoint. Previews are intended to be generated by the admins, developers, chief-editors, and editors, who are authorized to create content in the application. But due to lack of proper CSRF protection, unauthorized users could generate a preview. This has been fixed in Bolt 3.7.1
[ { "commit_message": "[PATCH 1/3] Check CSRF on Preview page src/Config.php | 2 +- src/Controller/Async/FilesystemManager.php | 4 +++- src/Controller/Frontend.php | 7 +++++++ 3 files changed, 11 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSAyNWQwZTg1M2Iw...
CWE-352: Cross-Site Request Forgery (CSRF)
GHSA-vwqw-wfhv-2xcq
MODX vulnerability allows for XSS via user settings parameters
null
[ { "commit_message": "[PATCH] Fix #14103 manager/assets/modext/widgets/core/modx.grid.settings.js | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBjMDhmYjdjN2ExZjU5NzlmZjEyNDFhN2IyOGFlMGY3NjkwNzU2YWQzIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBZ2VsX05hc2ggPGFnZWwtbmFzaEB5Y...
null
CVE-2023-29509
org.xwiki.platform:xwiki-platform-flamingo-theme-ui Eval Injection vulnerability
XWiki Commons are technical libraries common to several other top level XWiki projects. Any user with view rights on commonly accessible documents can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the `documentTree` macro parameters in This macro is installed by default in `FlamingoThemesCode.WebHome`. This page is installed by default. The vulnerability has been patched in XWiki 13.10.11, 14.4.7 and 14.10.
[ { "commit_message": "[PATCH] XWIKI-20279: Improved escaping in FlamingoThemesCode.WebHome .../xwiki-platform-flamingo-theme-ui/pom.xml | 8 ++++++++ .../src/main/resources/FlamingoThemesCode/WebHome.xml | 7 ++++++- 2 files changed, 14 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA...
CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
GHSA-wp3c-xw9g-gpcg
Lack of validation in `SparseDenseCwiseMul`
null
[ { "commit_message": "[PATCH] Fix heap-buffer-overflow issue with `tf.raw_ops.SparseDenseCwiseMul`. PiperOrigin-RevId: 372054410 Change-Id: Ifcce0491e2e3816838c87e73be30a1e61b65174d tensorflow/core/kernels/sparse_dense_binary_op_shared.cc | 5 +++++ 1 file changed, 5 insertions(+)", "patch_text_b64": "RnJvbSA...
null
GHSA-q34c-48gc-m9g8
actionpack allows remote attackers to bypass database-query restrictions, perform NULL checks via crafted request
null
[ { "commit_message": "[PATCH] Array parameters should not contain nil values. actionpack/lib/action_dispatch/http/request.rb | 6 ++++-- .../test/dispatch/request/query_string_parsing_test.rb | 4 ++++ 2 files changed, 8 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSAyZjNiYzA0NjczM...
null
CVE-2025-52565
container escape due to /dev/console mount and related races
runc is a CLI tool for spawning and running containers according to the OCI specification. Versions 1.0.0-rc3 through 1.2.7, 1.3.0-rc.1 through 1.3.2, and 1.4.0-rc.1 through 1.4.0-rc.2, due to insufficient checks when bind-mounting `/dev/pts/$n` to `/dev/console` inside the container, an attacker can trick runc into bind-mounting paths which would normally be made read-only or be masked onto a path that the attacker can write to. This attack is very similar in concept and application to CVE-2025-31133, except that it attacks a similar vulnerability in a different target (namely, the bind-mount of `/dev/pts/$n` to `/dev/console` as configured for all containers that allocate a console). This happens after `pivot_root(2)`, so this cannot be used to write to host files directly -- however, as with CVE-2025-31133, this can load to denial of service of the host or a container breakout by providing the attacker with a writable copy of `/proc/sysrq-trigger` or `/proc/sys/kernel/core_pattern` (respectively). This issue is fixed in versions 1.2.8, 1.3.3 and 1.4.0-rc.3.
[ { "commit_message": "[PATCH] rootfs: avoid using os.Create for new device inodes If an attacker were to make the target of a device inode creation be a symlink to some host path, os.Create would happily truncate the target which could lead to all sorts of issues. This exploit is probably not as exploitable beca...
CWE-61: UNIX Symbolic Link (Symlink) Following
GHSA-cmh9-rx85-xj38
XSS sidekiq-unique-jobs UI server vulnerability
null
[ { "commit_message": "[PATCH] fix: backport xss and rce fixes to v7.1 (#834) * fix: backport xss and rce fixes to v7.1 This was fixed in #829 and #833 * chore(lint): lint'em real good * chore: remove reek .github/workflows/lint.yml | 15 --------- .rubocop.yml ...
null
CVE-2021-31873
An issue was discovered in klibc before 2.0.9. Additions in the malloc() function may result in an integer overflow and a subsequent heap buffer overflow.
[ { "commit_message": "[PATCH] [klibc] malloc: Fail if requested size > PTRDIFF_MAX malloc() adds some overhead to the requested size, which may result in an integer overflow and subsequent buffer overflow if it is close to SIZE_MAX. It should fail if size is large enough for this to happen. Further, it's not le...
n/a
CVE-2016-5364
Cross-site scripting (XSS) vulnerability in manage_custom_field_edit_page.php in MantisBT 1.2.19 and earlier allows remote attackers to inject arbitrary web script or HTML via the return parameter.
[ { "commit_message": "[PATCH] Fix XSS in custom fields management Kacper Szurek (http://security.szurek.pl/) discovered an XSS vulnerability in Custom fields management pages, caused by unescaped output of 'return URL' GPC parameter. His report describes two ways to exploit this issue: 1. using 'accesskey' insid...
n/a
CVE-2024-35185
Denial of service of Minder Server with attacker-controlled REST endpoint
Minder is a software supply chain security platform. Prior to version 0.0.49, the Minder REST ingester is vulnerable to a denial of service attack via an attacker-controlled REST endpoint that can crash the Minder server. The REST ingester allows users to interact with REST endpoints to fetch data for rule evaluation. When fetching data with the REST ingester, Minder sends a request to an endpoint and will use the data from the body of the response as the data to evaluate against a certain rule. If the response is sufficiently large, it can drain memory on the machine and crash the Minder server. The attacker can control the remote REST endpoints that Minder sends requests to, and they can configure the remote REST endpoints to return responses with large bodies. They would then instruct Minder to send a request to their configured endpoint that would return the large response which would crash the Minder server. Version 0.0.49 fixes this issue.
[ { "commit_message": "[PATCH] Merge pull request from GHSA-fjw8-3gp8-4cvx This ensures that a malicious (or faulty) REST server does not crash minder with too big requests. Minder will thus limit requests body reads to 1Mb. Signed-off-by: Juan Antonio Osorio <ozz@stacklok.com> internal/engine/ingester/rest/rest....
CWE-400: Uncontrolled Resource Consumption
GHSA-6r7c-6w96-8pvw
Remote Code Execution in AjaxNetProfessional
null
[ { "commit_message": "[PATCH] added allowed customized types .gitignore | 1 + AjaxPro/AjaxPro.csproj | 13 +- AjaxPro/AjaxPro.sln | 4 +- .../AjaxSettingsSectionHandler.cs | 19 + AjaxPro/Handler/AjaxProcHelper...
null
GHSA-mjpp-wxm2-vx37
null
[ { "commit_message": "[PATCH] avcodec/vp3: Add missing check for av_malloc Since the av_malloc() may fail and return NULL pointer, it is needed that the 's->edge_emu_buffer' should be checked whether the new allocation is success. Fixes: d14723861b (\"VP3: fix decoding of videos with stride > 2048\") Reviewed-by...
null
GHSA-c4pm-63cg-9j7h
Yauaa vulnerable to ArrayIndexOutOfBoundsException triggered by a crafted Sec-Ch-Ua-Full-Version-List
null
[ { "commit_message": "[PATCH] feat: Better clienthint handling, ignore Kamo tags. CHANGELOG.md | 2 + .../clienthints/ClientHintsAnalyzer.java | 274 ++-- .../resources/UserAgents/Anonymize-Kamo.yaml | 1455 +++++++++++++++++ .../UserAgents/ClientHints-Tests.yaml |...
null
CVE-2020-26279
Path traversal
go-ipfs is an open-source golang implementation of IPFS which is a global, versioned, peer-to-peer filesystem. In go-ipfs before version 0.8.0-rc1, it is possible for path traversal to occur with DAGs containing relative paths during retrieval. This can cause files to be overwritten, or written to incorrect output directories. The issue can only occur when a get is done on an affected DAG. This is fixed in version 0.8.0-rc1.
[ { "commit_message": "[PATCH] chore: update deps go.mod | 14 +++++++------- go.sum | 24 ++++++++++++++---------- 2 files changed, 21 insertions(+), 17 deletions(-)", "patch_text_b64": "RnJvbSA3OWQ5NjgxNWE4ZDM5NmI0NmFjZWZhMjVkMzViN2M1OTk3ZGU2ODUzIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBZGluIFNjaG1haG1hbm4g...
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2022-26563
An issue was discovered in Tildeslash Monit before 5.31.0, allows remote attackers to gain escilated privlidges due to improper PAM-authorization.
[ { "commit_message": "[PATCH] Fixed: PAM authentication: Users with a valid password for disabled account can login to Monit. Thanks to Youssef Rebahi-Gilbert. CHANGES | 3 +++ src/util.c | 6 +++--- 2 files changed, 6 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSA2ZWNhYWIxZDM3NWYzMzE2NWZlOThkMD...
n/a
CVE-2024-24766
CasaOS Username Enumeration
CasaOS-UserService provides user management functionalities to CasaOS. Starting in version 0.4.4.3 and prior to version 0.4.7, the Casa OS Login page disclosed the username enumeration vulnerability in the login page. An attacker can enumerate the CasaOS username using the application response. If the username is incorrect application gives the error `**User does not exist**`. If the password is incorrect application gives the error `**Invalid password**`. Version 0.4.7 fixes this issue.
[ { "commit_message": "[PATCH] Merge pull request from GHSA-c967-2652-gfjm * fix: fix username enumeration * fix typo msg type * fix: recovery error patch * fix: recovery error patch Signed-off-by: CorrectRoadH <a778917369@gmail.com> route/v1/user.go | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)", ...
CWE-204: Observable Response Discrepancy
GHSA-hjp3-5g2q-7jww
Race Condition leading to logging errors
null
[ { "commit_message": "[PATCH 1/4] Use RequestStore instead of Thread.current for thread-safe requests. audited.gemspec | 1 + lib/audited.rb | 9 ++------- 2 files changed, 3 insertions(+), 7 deletions(-)", "patch_text_b64": "RnJvbSAzNjNhYzMwYTY3MTRlOGU4OTI0OTYzMGU5YmY4NGRjOTU1ZDQxYjY3IE1vbiBTZXAgMTcgMDA6MDA6...
null
CVE-2017-15306
The kvm_vm_ioctl_check_extension function in arch/powerpc/kvm/powerpc.c in the Linux kernel before 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) via a KVM_CHECK_EXTENSION KVM_CAP_PPC_HTM ioctl call to /dev/kvm.
[ { "commit_message": "[PATCH] KVM: PPC: Fix oops when checking KVM_CAP_PPC_HTM The following program causes a kernel oops: #include <sys/types.h> #include <sys/stat.h> #include <fcntl.h> #include <sys/ioctl.h> #include <linux/kvm.h> main() { int fd = open(\"/dev/kvm\", O_RDWR); ioctl(fd, KVM_CHECK_EXTENSION, KVM...
n/a
GHSA-5vp3-v4hc-gx76
UUPSUpgradeable vulnerability in @openzeppelin/contracts
null
[ { "commit_message": "[PATCH] Restrict upgrade to proxy context in UUPSUpgradeable Co-authored-by: Francisco Giordano <frangio.1@gmail.com> (cherry picked from commit 6241995ad323952e38f8d405103ed994a2dcde8e) CHANGELOG.md | 4 ++++ contracts/proxy/utils/UUPSUpgradeable.sol | 22 +++++...
null
CVE-2017-12893
The SMB/CIFS parser in tcpdump before 4.9.2 has a buffer over-read in smbutil.c:name_len().
[ { "commit_message": "[PATCH] CVE-2017-12893/SMB/CIFS: Add a bounds check in name_len(). MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit After we advance the pointer by the length value in the buffer, make sure it points to something in the captured data. This fixes a bu...
n/a
CVE-2010-10002
SimpleSAMLphp simplesamlphp-module-openid OpenID consumer.php cross site scripting
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as problematic has been found in SimpleSAMLphp simplesamlphp-module-openid. Affected is an unknown function of the file templates/consumer.php of the component OpenID Handler. The manipulation of the argument AuthState leads to cross site scripting. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. Upgrading to version 1.0 is able to address this issue. The patch is identified as d652d41ccaf8c45d5707e741c0c5d82a2365a9a3. It is recommended to upgrade the affected component. VDB-217170 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
[ { "commit_message": "[PATCH] openid: Fix cross-site scripting. Can be exploited by a malicious openid provider to execute scripts on the host using openid. git-svn-id: https://simplesamlphp.googlecode.com/svn/trunk@2444 44740490-163a-0410-bde0-09ae8108e29a templates/consumer.php | 2 +- 1 file changed, 1 inserti...
CWE-79 Cross Site Scripting
CVE-2025-31487
The XWiki JIRA extension allows data leak through an XXE attack by using a fake JIRA server
The XWiki JIRA extension provides various integration points between XWiki and JIRA (macros, UI, CKEditor plugin). If the JIRA macro is installed, any logged in XWiki user could edit his/her user profile wiki page and use that JIRA macro, specifying a fake JIRA URL that returns an XML specifying a DOCTYPE pointing to a local file on the XWiki server host and displaying that file's content in one of the returned JIRA fields (such as the summary or description for example). The vulnerability has been patched in the JIRA Extension v8.6.5.
[ { "commit_message": "[PATCH] JIRA-49: Don't access DTDs or Schemas jira-macro/jira-macro-default/pom.xml | 6 ------ .../jira/macro/internal/source/HTTPJIRAFetcher.java | 7 +++---- 2 files changed, 3 insertions(+), 10 deletions(-)", "patch_text_b64": "RnJvbSA1MDQ5ZTM1MmQxNmY4MzU2N...
CWE-611: Improper Restriction of XML External Entity Reference
CVE-2025-34176
Netgate pfSense CE Suricata Package v7.0.8_2 Directory Traversal Information Disclosure
In pfSense CE /suricata/suricata_ip_reputation.php, the value of the iplist parameter is not sanitized of directory traversal-related strings/characters. This value is directly used in a file existence check operation. While the contents of the file cannot be read, the server reveals whether the file exists, which enables an attacker to enumerate files on the target. The attacker must be authenticated with at least "WebCfg - Services: suricata package" permissions.
[ { "commit_message": "[PATCH] Suricata: Fix various validation and encoding issues. Fixes #16414 - Fix handling of files/hashes on suricata_filecheck.php - Ensure suricata_ip_reputation.php is checking the proper path to iprep files - Encode various outputs on suricata_flow_stream.php and suricata_app_parsers.ph...
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
GHSA-87h5-jxx9-3c5x
null
[ { "commit_message": "[PATCH] fix the setusercontext(3) workaround Seeing this being used on even more system like Illumos with this ugly and security critical bug open makes me cringe every time I check if it was finally fixed. I reported it directly to the maintainer in 2017. I reported it to pkgsrc-security@n...
null
CVE-2024-28240
GLPI-Agent's MSI package installation permits local users to change Agent configuration
The GLPI Agent is a generic management agent. A vulnerability that only affects GLPI-Agent installed on windows via MSI packaging can allow a local user to cause denial of agent service by replacing GLPI server url with a wrong url or disabling the service. Additionally, in the case the Deploy task is installed, a local malicious user can trigger privilege escalation configuring a malicious server providing its own deploy task payload. GLPI-Agent 1.7.2 contains a patch for this issue. As a workaround, edit GLPI-Agent related key under `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall` and add `SystemComponent` DWORD value setting it to `1` to hide GLPI-Agent from installed applications.
[ { "commit_message": "[PATCH] fix: Fix critical security issue on windows MSI packaging Changes | 2 ++ contrib/windows/packaging/MSI_main-v2.wxs.tt | 12 ++++++++++++ 2 files changed, 14 insertions(+)", "patch_text_b64": "RnJvbSA0MWJiYjExNjllODk5YmQxNTM1MGE5ZTJmZGJmOTI2OW...
CWE-20: Improper Input Validation
CVE-2013-0234
Cross-site scripting (XSS) vulnerability in the Twitter widget in Elgg before 1.7.17 and 1.8.x before 1.8.13 allows remote attackers to inject arbitrary web script or HTML via the params[twitter_username] parameter to action/widgets/save.
[ { "commit_message": "[PATCH] Corrects encoding and other small tweaks in Twitter widget mod/twitter/languages/en.php | 9 ++-- .../views/default/widgets/twitter/edit.php | 20 ++++++--- .../views/default/widgets/twitter/view.php | 41 ++++++++++++------- 3 files changed, 47 insertions(+), 2...
n/a
CVE-2023-35847
VirtualSquare picoTCP (aka PicoTCP-NG) through 2.1 does not have an MSS lower bound (e.g., it could be zero).
[ { "commit_message": "[PATCH] TCP: Fixed MSS size calculation. Set MSS lower bound. Reported-by: \"P. Amsuo, Purdue University\" modules/pico_tcp.c | 16 +++++++++++++--- modules/pico_tcp.h | 1 + 2 files changed, 14 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSBlYWYxNjYwMDllNDQ2NDFlNjU3MGM1NzZiYT...
n/a
GHSA-j72v-r3gf-6w7r
null
[ { "commit_message": "[PATCH] sysctl: restrict write access to dmesg_restrict When dmesg_restrict is set to 1 CAP_SYS_ADMIN is needed to read the kernel ring buffer. But a root user without CAP_SYS_ADMIN is able to reset dmesg_restrict to 0. This is an issue when e.g. LXC (Linux Containers) are used and comple...
null
CVE-2022-2064
Insufficient Session Expiration in nocodb/nocodb
Insufficient Session Expiration in GitHub repository nocodb/nocodb prior to 0.91.7+.
[ { "commit_message": "[PATCH 1/7] script: add nc_017_add_user_token_exp_column .../src/lib/migrations/XcMigrationSourcev2.ts | 6 ++- .../v2/nc_017_add_user_token_exp_column.ts | 37 +++++++++++++++++++ 2 files changed, 42 insertions(+), 1 deletion(-) create mode 100644 packages/nocodb/src/lib/migrations/v2/nc...
CWE-613 Insufficient Session Expiration
GHSA-jq4c-w8cq-9639
null
[ { "commit_message": "[PATCH] avfilter/vf_fps: make sure the fifo is not empty before using it Fixes Ticket2905 Signed-off-by: Michael Niedermayer <michaelni@gmx.at> libavfilter/vf_fps.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBjZGQ1ZGY4MTg5ZmYxNTM3ZjdhYmU4ZGVmZTk3MWY4...
null
GHSA-6jhf-6jfc-fjgh
null
[ { "commit_message": "[PATCH] Added some missing sanity checks on the data in a SIZ marker segment. src/libjasper/jpc/jpc_cs.c | 57 +++++++++++++++++++++++++++----------- 1 file changed, 41 insertions(+), 16 deletions(-)", "patch_text_b64": "RnJvbSBmNzAzODA2ODU1MGZiYTBlNDFlMWQwYzM1NTc4N2YxZGNkNWJmMzMwIE1vbiB...
null
GHSA-vr9r-v9gj-9422
null
[ { "commit_message": "[PATCH] SuiteCRM 7.14.1 Release README.md | 2 +- data/SugarBean.php | 4 +- files.md5 | 103 +++++++++++++++--------------- include/utils.php | 4 +- suitecrm_version.php | 4 +- themes/SuiteP/cs...
null
GHSA-rm97-x556-q36h
sanitize-html Information Exposure vulnerability
null
[ { "commit_message": "[PATCH 1/3] fix: ignore source maps when processing with postcss index.js | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAwNzU0OTlkMWI5OGMzODdmNDIwMGZkNTk5NzJjYTliMTU3OTZiNTFiIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBEeWxhbiBBcm1zdHJvbmcgPGR5bGFuQGR5bGF...
null
CVE-2024-23830
MantisBT Host Header Injection vulnerability
MantisBT is an open source issue tracker. Prior to version 2.26.1, an unauthenticated attacker who knows a user's email address and username can hijack the user's account by poisoning the link in the password reset notification message. A patch is available in version 2.26.1. As a workaround, define `$g_path` as appropriate in `config_inc.php`.
[ { "commit_message": "[PATCH] Merge pull request from GHSA-mcqj-7p29-9528 * Address host header injection vulnerability $g_path is empty by default, and should be defined in config_inc.php. Not doing so is a security risk, as the path will then be set based on headers from the HTTP request, exposing the system t...
CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
GHSA-jmjf-cmq5-7w25
Liferay Portal Vulnerable to XSS via a Crafted Redirect Field
null
[ { "commit_message": "<tomas.polesovsky@liferay.com> [PATCH] LPS-68469 Missing escape .../src/main/resources/META-INF/resources/init.jsp | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSAzMzNmNjViYWU5MTA2MTgyZDEyZTAyZDI0OWQ0Zjk1ZTE2ZTkzZmEyIE1vbiBTZXAgMTcgMDA6MDA...
null
GHSA-xg8h-j46f-w952
Pillow vulnerability can cause write buffer overflow on BCn encoding
null
[ { "commit_message": "[PATCH] Fix buffer overflow when saving compressed DDS images (#9041) Co-authored-by: Eric Soroos <eric-github@soroos.net> Tests/test_file_dds.py | 17 +++++++++++++++++ src/libImaging/BcnEncode.c | 4 ++++ 2 files changed, 21 insertions(+)", "patch_text_b64": "RnJvbSBlZjk4YjM1MTBlM2...
null
GHSA-fhfc-2q7x-929f
TensorFlow vulnerable to `CHECK` fail in `CollectiveGather`
null
[ { "commit_message": "[PATCH] Fix for check failure in CollectiveGather op. The fix is required only for Eager mode, graph mode already checked for input shape in shape inference pass. PiperOrigin-RevId: 460801136 tensorflow/core/kernels/collective_ops.cc | 4 ++++ tensorflow/python/ops/collective_ops_test.py...
null
CVE-2023-4733
Use After Free in vim/vim
Use After Free in GitHub repository vim/vim prior to 9.0.1840.
[ { "commit_message": "[PATCH] patch 9.0.1840: [security] use-after-free in do_ecmd Problem: use-after-free in do_ecmd Solution: Verify oldwin pointer after reset_VIsual() Signed-off-by: Christian Brabandt <cb@256bit.org> src/ex_cmds.c | 14 ++++++++++---- src/testdir/Make_all.mak ...
CWE-416 Use After Free
CVE-2016-9456
Revive Adserver before 3.2.3 suffers from Cross-Site Request Forgery (CSRF). The Revive Adserver team conducted a security audit of the admin interface scripts in order to identify and fix other potential CSRF vulnerabilities. Over 20+ such issues were fixed.
[ { "commit_message": "[PATCH] Fix other CSRF issues Cross-Site Request Forgery (CSRF) Following a number of CSRF reports, the Revive Team has conducted a security audit of the admin interface scripts in order to identify and fix other potential CSRF vulnerabilities. The effort led to fixing 20+ such issues: plea...
Cross-Site Request Forgery (CSRF) (CWE-352)
GHSA-gpfh-jvf9-7wg5
Use after free / memory leak in `CollectiveReduceV2`
null
[ { "commit_message": "[PATCH] Fix undefined behavior in CollectiveReduceV2 and others We should not call done after it's moved. PiperOrigin-RevId: 400838185 Change-Id: Ifc979740054b8f8c6f4d50acc89472fe60c4fdb1 tensorflow/core/kernels/collective_ops.cc | 25 ++++---- .../kernel_tests/collective_ops_test.py ...
null
GHSA-x7q2-wr7g-xqmf
Django vulnerable to user enumeration attack
null
[ { "commit_message": "[PATCH] [5.0.x] Fixed CVE-2024-39329 -- Standarized timing of verify_password() when checking unusuable passwords. Refs #20760. Thanks Michael Manfre for the fix and to Adam Johnson for the review. django/contrib/auth/hashers.py | 10 ++++++++-- docs/releases/4.2.14.txt | 7 ++++++...
null
CVE-2017-13145
In ImageMagick before 6.9.8-8 and 7.x before 7.0.5-9, the ReadJP2Image function in coders/jp2.c does not properly validate the channel geometry, leading to a crash.
[ { "commit_message": "[PATCH] ... coders/jp2.c | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBhY2VlMDczZGYzNGFhNGQ0OTFiZjVjYjc0ZDNhMTVmYzgwZjBhM2FhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBDcmlzdHkgPHVyYmFuLXdhcnJpb3JAaW1hZ2VtYWdpY2sub3JnPgpEYXRlOiBTdW4sIDIxIE1heSAyMDE...
n/a
CVE-2021-22550
Enclave memory overwrite/overread vulnerability in Asylo UntrustedCacheMalloc::GetBuffer
An attacker can modify the pointers in enclave memory to overwrite arbitrary memory addresses within the secure enclave. It is recommended to update past 0.6.3 or git commit https://github.com/google/asylo/commit/a47ef55db2337d29de19c50cd29b0deb2871d31c
[ { "commit_message": "[PATCH] Fix vulnerability in UntrustedCacheMalloc The pointer array is stored in untrusted memory, so we cannot trust the value even after validation. We should validate the pointer is pointing to untrusted memory after it's stored inside the enclave. PiperOrigin-RevId: 358474391 Change-Id:...
CWE-823 Use of Out-of-range Pointer Offset
CVE-2024-50342
Internal address and port enumeration allowed by NoPrivateNetworkHttpClient in symfony/http-client
symfony/http-client is a module for the Symphony PHP framework which provides powerful methods to fetch HTTP resources synchronously or asynchronously. When using the `NoPrivateNetworkHttpClient`, some internal information is still leaking during host resolution, which leads to possible IP/port enumeration. As of versions 5.4.46, 6.4.14, and 7.1.7 the `NoPrivateNetworkHttpClient` now filters blocked IPs earlier to prevent such leaks. All users are advised to upgrade. There are no known workarounds for this vulnerability.
[ { "commit_message": "[PATCH] [HttpClient] Filter private IPs before connecting when Host == IP .../HttpClient/NoPrivateNetworkHttpClient.php | 13 ++++++++- .../Tests/NoPrivateNetworkHttpClientTest.php | 27 +++++++++++++++++-- 2 files changed, 37 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSAyOT...
CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
GHSA-q8fq-52x5-p228
null
[ { "commit_message": "[PATCH] tiffcrop: disable incompatibility of -Z, -X, -Y, -z options with any PAGE_MODE_x option (fixes #411 and #413) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit tiffcrop does not support –Z, -z, -X and –Y options together with any other PAGE_MO...
null
GHSA-4cxv-c4qq-q263
null
[ { "commit_message": "[PATCH] HTML escape command description custom/run.cgi | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBhOWM5N2VlYTZjMjY4ZmI4M2Q5M2E4MTdkNThiYWM3NWUwZDI1OTllIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBKYW1pZSBDYW1lcm9uIDxqY2FtZXJvbkB3ZWJtaW4uY29tPgpEY...
null
GHSA-278g-rq84-9hmg
`CHECK`-fail in `MapStage`
null
[ { "commit_message": "[PATCH] Prevent a CHECK-fail due to empty tensor input in `map_stage_op.cc` PiperOrigin-RevId: 387737906 Change-Id: Idc52df0c71c7ed6e2dd633b651a581932f277c8a tensorflow/core/kernels/map_stage_op.cc | 2 ++ 1 file changed, 2 insertions(+)", "patch_text_b64": "RnJvbSBkN2RlNjc3MzM5MjVkZTE5N...
null
GHSA-3qqg-pgqq-3695
Gradio vulnerable to arbitrary file read and proxying of arbitrary URLs
null
[ { "commit_message": "[PATCH] Restrict proxy URLs (#4406) * restrict proxy urls * fix test * changelog * fix tests * Update gradio/routes.py Co-authored-by: Aarni Koskela <akx@iki.fi> * Update gradio/routes.py Co-authored-by: Aarni Koskela <akx@iki.fi> * fix test * docstring * bring back hf url * fix tests * Upd...
null
CVE-2022-3626
LibTIFF 4.4.0 has an out-of-bounds write in _TIFFmemset in libtiff/tif_unix.c:340 when called from processCropSelections, tools/tiffcrop.c:7619, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 236b7191.
[ { "commit_message": "[PATCH] tiffcrop: disable incompatibility of -Z, -X, -Y, -z options with any PAGE_MODE_x option (fixes #411 and #413) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit tiffcrop does not support –Z, -z, -X and –Y options together with any other PAGE_MO...
Out-of-bounds write in libtiff
CVE-2023-34110
Flask-AppBuilder vulnerable to possible disclosure of sensitive information on user error
Flask-AppBuilder is an application development framework, built on top of Flask. Prior to version 4.3.2, an authenticated malicious actor with Admin privileges, could by adding a special character on the add, edit User forms trigger a database error, this error is surfaced back to this actor on the UI. On certain database engines this error can include the entire user row including the pbkdf2:sha256 hashed password. This vulnerability has been fixed in version 4.3.2.
[ { "commit_message": "[PATCH] fix: CRUD MVC log message (#2045) * fix: CRUD MVC log message * lint * add tests * fix lint and tests * fix lint and tests * revert babel name refactor * fix lint flask_appbuilder/babel/manager.py | 5 +- flask_appbuilder/models/base.py | 58 ++++----- fla...
CWE-209: Generation of Error Message Containing Sensitive Information
CVE-2022-1934
Use After Free in mruby/mruby
Use After Free in GitHub repository mruby/mruby prior to 3.2.
[ { "commit_message": "[PATCH] vm.c (hash_new_from_regs): stack may be reallocated. src/vm.c | 13 +++++++------ 1 file changed, 7 insertions(+), 6 deletions(-)", "patch_text_b64": "RnJvbSBhYTdmOThkZWRiNjhkNzM1YTE2NjVkM2EyODkwMzZjODhiMGM0N2NlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiAiWXVraWhpcm8gXCJNYXR6XCIgT...
CWE-416 Use After Free
GHSA-fmqf-pmcm-8cx9
Mattermost doesn't validate user channel membership when attaching Mattermost posts as comments to Jira issues
null
[ { "commit_message": "[PATCH] Update Jira prepackaged (#34551) server/Makefile | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBiNTdjMjk3YzZkN2FlNjgxMmQ4NWUzMmE2MjU4MDZhYzk1NTVkZWVlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBNYXJpYSBBIE51bmV6IDxtYXJpYS5udW5lekBtYXR0ZXJtb3N0LmNv...
null
GHSA-4cv2-xc5f-px8h
Denial of Service in extension "Code Highlight" (codehighlight)
null
[ { "commit_message": "<2566282+brotkrueml@users.noreply.github.com> [PATCH] [SECURITY] Update Prism to version 1.23.0 .../{prismjs+1.22.0.patch => prismjs+1.23.0.patch} | 6 +++--- Build/yarn.lock | 6 +++--- CHANGELOG.md | 3 +++ ...
null
CVE-2023-47637
SQL Injection in Admin Grid Filter API in Pimcore
Pimcore is an Open Source Data & Experience Management Platform. In affected versions the `/admin/object/grid-proxy` endpoint calls `getFilterCondition()` on fields of classes to be filtered for, passing input from the request, and later executes the returned SQL. One implementation of `getFilterCondition()` is in `Multiselect`, which does not normalize/escape/validate the passed value. Any backend user with very basic permissions can execute arbitrary SQL statements and thus alter any data or escalate their privileges to at least admin level. This vulnerability has been addressed in version 11.1.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
[ { "commit_message": "[PATCH] Fix: escape filter values models/DataObject/ClassDefinition/Data/Multiselect.php | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBkMTY0ZDk5YzkwZjA5OGQwY2NkNmI3MjkyOWM0OGI3MjdlMjk1M2EwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiByb2JlcnRTdDcgPHJv...
CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
GHSA-475f-74wp-pqv5
Integer Overflow or Wraparound in Apache Tomcat
null
[ { "commit_message": "[PATCH] Improve processing of chuck size from chunked headers. Avoid overflow and use a bit shift instead of a multiplication as it is marginally faster. git-svn-id: https://svn.apache.org/repos/asf/tomcat/tc7.0.x/trunk@1578341 13f79535-47bb-0310-9956-ffa450edef68 .../http11/filters/Chunked...
null
CVE-2023-0880
Misinterpretation of Input in thorsten/phpmyfaq
Misinterpretation of Input in GitHub repository thorsten/phpmyfaq prior to 3.1.11.
[ { "commit_message": "[PATCH] fix: added trim to avoid questions with a single space phpmyfaq/ajaxservice.php | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-)", "patch_text_b64": "RnJvbSBhNjdkY2E0MTU3NjgzNGExZGRmZWU2MWI5ZTc5OWI2ODZiNzVkNGZhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBUaG...
CWE-115 Misinterpretation of Input
GHSA-g26j-5385-hhw3
LiteLLM Server-Side Request Forgery (SSRF) vulnerability
null
[ { "commit_message": "[PATCH] add check for is_request_body_safe litellm/proxy/auth/auth_checks.py | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+)", "patch_text_b64": "RnJvbSBiYTE5MTJhZmQxYjE5ZTM4ZDM3MDRiYjE1NmFkZjg4N2Y5MWFlMWUwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBJc2hhYW4gSmFmZiA8aXNoYWFuamFm...
null
GHSA-x2xw-hw8g-6773
govuk_tech_docs vulnerable to unescaped HTML on search results page
null
[ { "commit_message": "[PATCH 1/2] Fix XSS vulnerability on search results page Pages that are indexed in search results have their entire contents indexed, including any HTML code snippets. These HTML snippets would appear in the search results unsanitised, so it was possible to render arbitrary HTML or run arbi...
null
CVE-2024-43788
DOM Clobbering Gadget found in Webpack's AutoPublicPathRuntimeModule that leads to Cross-site Scripting (XSS)
Webpack is a module bundler. Its main purpose is to bundle JavaScript files for usage in a browser, yet it is also capable of transforming, bundling, or packaging just about any resource or asset. The webpack developers have discovered a DOM Clobbering vulnerability in Webpack’s `AutoPublicPathRuntimeModule`. The DOM Clobbering gadget in the module can lead to cross-site scripting (XSS) in web pages where scriptless attacker-controlled HTML elements (e.g., an `img` tag with an unsanitized `name` attribute) are present. Real-world exploitation of this gadget has been observed in the Canvas LMS which allows a XSS attack to happen through a javascript code compiled by Webpack (the vulnerable part is from Webpack). DOM Clobbering is a type of code-reuse attack where the attacker first embeds a piece of non-script, seemingly benign HTML markups in the webpage (e.g. through a post or comment) and leverages the gadgets (pieces of js code) living in the existing javascript code to transform it into executable code. This vulnerability can lead to cross-site scripting (XSS) on websites that include Webpack-generated files and allow users to inject certain scriptless HTML tags with improperly sanitized name or id attributes. This issue has been addressed in release version 5.94.0. All users are advised to upgrade. There are no known workarounds for this issue.
[ { "commit_message": "[PATCH 1/3] security: fix DOM clobbering in auto public path lib/runtime/AutoPublicPathRuntimeModule.js | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAyNDExNjYxYmQxYmVkZjFiMmVmYzIzYzc2ZDU5NWMxODk0MjVkMzlmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiAiY...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-jmxr-w2jc-qp7w
Promotion names in Jenkins promoted builds Plugin are not validated when using Job DSL
null
[ { "commit_message": "[PATCH] SECURITY-2655 .../integrations/jobdsl/PromotionsExtensionPoint.java | 2 ++ 1 file changed, 2 insertions(+)", "patch_text_b64": "RnJvbSBkNmZkOTU2ODhhZTIwNTJiZjlhYzcxNThiYzI1NzljNzU1MTY3ZmUwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBDYXJyb2xsIENoaW91IDxjY2hpb3VAY2xvdWRiZ...
null
GHSA-j972-j939-p2v3
quic-go Has Panic in Path Probe Loss Recovery Handling
null
[ { "commit_message": "[PATCH] ackhandler: fix panic in probe packet tracking logic (#4998) Under certain circumstances (loss and acknowledgment patterns), the probe packet tracking logic could run into a nil-pointer dereference. internal/ackhandler/sent_packet_handler.go | 7 +- .../ackhandler/sent_packet_han...
null
GHSA-39p7-8vm9-rjp3
null
[ { "commit_message": "[PATCH] SQL injection possibility lib/uke/finder.rb | 34 +++++++++++++++++----------------- 1 file changed, 17 insertions(+), 17 deletions(-)", "patch_text_b64": "RnJvbSA1MmZkM2IyZDBiYzE2MjI3ZWY1N2I3Yjk4YTM2NThiYjY3YzE4MzNmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBcmVrIEsgPGFya2FkaXVz...
null
GHSA-5gg7-5wv8-4gcj
Undertow Request Smuggling vulnerability
null
[ { "commit_message": "[PATCH] JBEAP-9909 Prevent HTTP smuggling attacks by making sure messages do not contain invalid headers. Also verify that there is at most one Content-Length and Transfer-Encoding header .../java/io/undertow/UndertowMessages.java | 9 ++ .../http2/Http2HeaderBlockParser.java | ...
null
GHSA-vf4q-8mr7-5c5c
Camel-castor component in Apache Camel is vulnerable to Java object de-serialisation
null
[ { "commit_message": "[PATCH] [CAMEL-11929] Fix org.apache.camel.model.ModelSanityCheckerTest (cherry picked from commit c613905e95a3dab87158d9526aea9439f2de9621) .../org/apache/camel/model/dataformat/CastorDataFormat.java | 4 ++++ 1 file changed, 4 insertions(+)", "patch_text_b64": "RnJvbSAyYWU2NDVlOTBlZG...
null
GHSA-7cwg-2575-3546
Tryton Information Disclosure Vulnerability
null
[ { "commit_message": "[PATCH] Sanitize path in file_open against suffix issue6361 review33191002 CHANGELOG | 1 + trytond/tests/test_tools.py | 5 +++++ trytond/tools/misc.py | 2 +- 3 files changed, 7 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAzMGU5Nzg1OTM3MzMzODVkYjMxNDRm...
null
CVE-2024-45396
Quicly assertion failures
Quicly is an IETF QUIC protocol implementation. Quicly up to commtit d720707 is susceptible to a denial-of-service attack. A remote attacker can exploit these bugs to trigger an assertion failure that crashes process using quicly. The vulnerability is addressed with commit 2a95896104901589c495bc41460262e64ffcad5c.
[ { "commit_message": "[PATCH 1/2] fix assertion failures lib/quicly.c | 10 +++++++--- 1 file changed, 7 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSA3Mjk0NzBjODQzODZiMTQ3MTU0ZGYxZDdiZWVkNzRmMzhjMzkxZWM4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBLYXp1aG8gT2t1IDxrYXp1aG9va3VAZ21haWwuY29tPgpEYXRlOi...
CWE-617: Reachable Assertion
GHSA-pcf7-fwpx-5mr2
null
[ { "commit_message": "[PATCH] ofp-actions: Avoid buffer overread in BUNDLE action decoding. Reported-at: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=9052 Signed-off-by: Ben Pfaff <blp@ovn.org> Acked-by: Justin Pettit <jpettit@ovn.org> lib/ofp-actions.c | 13 +++++++------ 1 file changed, 7 insertions(+)...
null
GHSA-j68h-w25q-72h9
null
[ { "commit_message": "[PATCH] avcodec/pngdsp: fix (un)signed type in end comparission Fixes out of array accesses Fixes Ticket2919 Found_by: ami_stuff Signed-off-by: Michael Niedermayer <michaelni@gmx.at> libavcodec/pngdsp.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA4Nj...
null
GHSA-cg34-cm8x-3w46
null
[ { "commit_message": "[PATCH] v3.5.4 released simple-download-monitor/main.php | 22 +++++++++++----------- simple-download-monitor/readme.txt | 5 ++++- 2 files changed, 15 insertions(+), 12 deletions(-)", "patch_text_b64": "RnJvbSA4YWI4YjkxNjZiYzg3ZmViYTI2YTE1NzNjZjU5NWFmNDhlZmY3ODA1IE1vbiBTZXAgMTcgMDA6MD...
null
GHSA-r4f5-rm36-v672
null
[ { "commit_message": "[PATCH] vhost: fix total length when packets are too short When mergeable buffers are disabled, and the incoming packet is too large for the rx buffer, get_rx_bufs returns success. This was intentional in order for make recvmsg truncate the packet and then handle_rx would detect err != sock...
null
CVE-2022-3959
drogon Session Hash small space of random values
A vulnerability, which was classified as problematic, has been found in drogon up to 1.8.1. Affected by this issue is some unknown functionality of the component Session Hash Handler. The manipulation leads to small space of random values. The attack may be launched remotely. Upgrading to version 1.8.2 is able to address this issue. The name of the patch is c0d48da99f66aaada17bcd28b07741cac8697647. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-213464.
[ { "commit_message": "[PATCH] Avoid HashDoS attacks via random per-session hash initial state (#1433) lib/inc/drogon/HttpRequest.h | 27 ++++++++++++++++++--------- lib/inc/drogon/HttpResponse.h | 18 +++++++++++++----- lib/inc/drogon/utils/Utilities.h | 17 +++++++++++++++++ lib/src/HttpRequestImpl.h ...
CWE-330 Insufficiently Random Values -> CWE-331 Insufficient Entropy -> CWE-334 Small Space of Random Values
CVE-2025-62411
Stored XSS in Alert Transport name field in LibreNMS
LibreNMS is a community-based GPL-licensed network monitoring system. LibreNMS <= 25.8.0 contains a Stored Cross-Site Scripting (XSS) vulnerability in the Alert Transports management functionality. When an administrator creates a new Alert Transport, the value of the Transport name field is stored and later rendered in the Transports column of the Alert Rules page without proper input validation or output encoding. This leads to arbitrary JavaScript execution in the admin’s browser. This vulnerability is fixed in 25.10.0.
[ { "commit_message": "[PATCH] Fix XSS in alert rules page (#18353) For transport names includes/html/print-alert-rules.php | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSA3MDZhNzcwODVmNGQ1OTY0ZjdkZTk0NDQyMDhlZjcwN2UxZjc5NDUwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBUb2...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-2859
Code Injection in nilsteampassnet/teampass
Code Injection in GitHub repository nilsteampassnet/teampass prior to 3.0.9.
[ { "commit_message": "[PATCH] 3.0.9 Fix vulnerability in form folder creation includes/config/include.php | 2 +- {install1 => install}/css/install.css | 0 .../css/overcast/images/animated-overlay.gif | Bin .../images/ui-bg_flat_0_aaaaaa_40x100.png | Bin .../images/ui-bg_flat_0_...
CWE-94 Improper Control of Generation of Code
GHSA-qvpv-3hvr-c7gq
null
[ { "commit_message": "[PATCH] Fix SQLi in settings::save_all() Closes #680 application/models/settings.php | 13 +++++++------ 1 file changed, 7 insertions(+), 6 deletions(-)", "patch_text_b64": "RnJvbSA0NzY0NzkyZDYyOGQ0MGQwNjFmOTEwMTAyMTM1YjMzYWUyMTIzYzgxIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBSb2JiaWUgTW...
null
CVE-2023-0791
Cross-site Scripting (XSS) - Stored in thorsten/phpmyfaq
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.11.
[ { "commit_message": "[PATCH] fix: added missing escaping of newly added values phpmyfaq/admin/instances.php | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSAyNjY2M2VmY2IwYjY3ZTQyMWU0ZWNjY2FkOGYxOWU3MTA2YmIwM2NlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBUaG9yc3RlbiBSaW...
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-jfgp-674x-6q4p
Weblate vulnerable to improper sanitization of project backups
null
[ { "commit_message": "[PATCH] fix(backups): skip pontentially bogus files in backups weblate/trans/backups.py | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSBiNmE3ZWFjZTE1NWZhMGZlYWYwMWI0YWMzNjE2NWE5YzVlNjNiZmRkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiA9P1VURi04P3E/T...
null
GHSA-c38p-vw6j-qjpr
Cross-site Scripting in thorsten/phpmyfaq
null
[ { "commit_message": "[PATCH] fix: added missing escaping of newly added values phpmyfaq/admin/instances.php | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSAyNjY2M2VmY2IwYjY3ZTQyMWU0ZWNjY2FkOGYxOWU3MTA2YmIwM2NlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBUaG9yc3RlbiBSaW...
null
GHSA-7m48-2x85-6wq3
null
[ { "commit_message": "[PATCH] Add authentication and ownership checks to ImageGallery endpoints plugin/ImageGallery/delete.json.php | 11 ++++++++++- plugin/ImageGallery/upload.json.php | 12 +++++++++++- 2 files changed, 21 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSAyNzVhNTQyNjhiMmUzMDkyM2U2ZGZ...
null
CVE-2022-34035
HTMLDoc v1.9.12 and below was discovered to contain a heap overflow via e_node htmldoc/htmldoc/html.cxx:588.
[ { "commit_message": "[PATCH] Fix a crash bug with bogus text (Issue #426) CHANGES.md | 1 + htmldoc/html.cxx | 4 ++-- htmldoc/htmllib.cxx | 2 +- htmldoc/htmlsep.cxx | 2 +- 4 files changed, 5 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSBlZTc3ODI1MmZhZWJiNzIxYWZiYTVhMDgxZGQ2YWQ3ZWFmMjB...
n/a
GHSA-86mr-6m89-vgj3
Buffer Overflow in node-weakauras-parser
null
[ { "commit_message": "[PATCH] Fix the possibility of a usize overflow This was introduced in bcee12c26196. A buffer of 13835058055282163711 bytes would cause an overflow on a 64-bit system when fed to base64::encode_weakaura(). Good news are, this function accepts a DEFLATE-compressed input rather than whatever ...
null
GHSA-xfjj-f699-rc79
tiagorlampert CHAOS vulnerable to arbitrary code execution
null
[ { "commit_message": "[PATCH] validate input values cmd/chaos/main.go | 8 ++--- delivery/http/handler.go | 18 +++++----- internal/middleware/jwt.go | 2 +- internal/utilities/string.go | 15 -------- internal/{utilities => utils...
null
CVE-2022-2063
Improper Privilege Management in nocodb/nocodb
Improper Privilege Management in GitHub repository nocodb/nocodb prior to 0.91.7+.
[ { "commit_message": "[PATCH] Fix: Remove user reference from webhook context (#2337) * fix: remove user info from webhook handlebar context Signed-off-by: Pranav C <pranavxc@gmail.com> * docs: update webhook context variables docs Signed-off-by: Pranav C <pranavxc@gmail.com> .../en/developer-resources/webhooks....
CWE-269 Improper Privilege Management
CVE-2017-17899
SQL injection vulnerability in adherents/subscription/info.php in Dolibarr ERP/CRM version 6.0.4 allows remote attackers to execute arbitrary SQL commands via the rowid parameter.
[ { "commit_message": "[PATCH] FIX security vulnerability reported by ADLab of Venustech htdocs/adherents/subscription/info.php | 6 +++--- htdocs/cashdesk/tpl/facturation1.tpl.php | 8 ++++++++ htdocs/cashdesk/tpl/liste_articles.tpl.php | 8 ++++++++ htdocs/cashdesk/tpl/menu.tpl.php | 8 ++++++++...
n/a
CVE-2021-32847
Moby HyperKit uninitialized memory use in virtio-sock pci_vtsock_proc_tx
HyperKit is a toolkit for embedding hypervisor capabilities in an application. In versions 0.20210107 and prior, a malicious guest can trigger a vulnerability in the host by abusing the disk driver that may lead to the disclosure of the host memory into the virtualized guest. This issue is fixed in commit cf60095a4d8c3cb2e182a14415467afd356e982f.
[ { "commit_message": "[PATCH] Fix assertion turned into assignment The qassertion is supposed to check the value but the typo makes it an assignment. Hence it is always true, Signed-off-by: Frederic Dalleau <frederic.dalleau@docker.com> src/lib/pci_virtio_block.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion...
CWE-125 Out-of-bounds Read
GHSA-gf9x-6xqh-g38j
null
[ { "commit_message": "[PATCH] backport from 1.9 (rev #9980) fixed temporary GRUU bug that lead to infinite loop Credits to Tolga Tarhan git-svn-id: svn+ssh://svn.code.sf.net/p/opensips/svn/trunk@9982 689a6050-402a-0410-94f2-e92a70836424 modules/registrar/lookup.c | 1 + 1 file changed, 1 insertion(+)", "patch...
null
CVE-2023-4722
Integer Overflow or Wraparound in gpac/gpac
Integer Overflow or Wraparound in GitHub repository gpac/gpac prior to 2.3-DEV.
[ { "commit_message": "[PATCH] Fixed #2579 src/filters/mux_isom.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBkZTdmM2E4NTJiZWY3MmE1MjgyNWZkMzA3Y2Y0ZThmNDg2NDAxYTc2IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBqZWFubGYgPGplYW5sZkBncGFjLmlvPgpEYXRlOiBGcmksIDEgU2VwIDIwMjMgMTE6NT...
CWE-190 Integer Overflow or Wraparound
PYSEC-2020-280
null
[ { "commit_message": "[PATCH] Fix multiple vulnerabilities in `tf.raw_ops.*CountSparseOutput`. Also add tests for these API points, both for the happy paths and for the vulnerable ones. PiperOrigin-RevId: 332563222 Change-Id: Ib3b52116a83a134c2e742a7c66e5e956db8fba05 tensorflow/core/kernels/count_ops.cc | ...
null
GHSA-fpr2-2gg6-pf5c
null
[ { "commit_message": "[PATCH] Fix CVE-2015-7364 Cross-Site Request Forgery (CSRF) Abdullah Hussam Gazi discovered that the CSRF protection mechanism introduced a few years ago to secure the forms generated with the HTML_Quickform library (most fo the forms in Revive Adserver's admin UI) could be easily bypassed ...
null
CVE-2022-0213
Heap-based Buffer Overflow in vim/vim
vim is vulnerable to Heap-based Buffer Overflow
[ { "commit_message": "[PATCH] patch 8.2.4074: going over the end of NameBuff Problem: Going over the end of NameBuff. Solution: Check length when appending a space. src/drawscreen.c | 9 +++++---- src/testdir/test_edit.vim | 15 +++++++++++++++ src/version.c | 2 ++ 3 files changed, 22 i...
CWE-122 Heap-based Buffer Overflow
GHSA-2j39-qcjm-428w
Apache Struts vulnerable to path traversal
null
[ { "commit_message": "[PATCH] Makes HttpParameters case-insensitive .../struts2/dispatcher/HttpParameters.java | 47 +++++++++++--- .../dispatcher/HttpParametersTest.java | 65 +++++++++++++++++++ 2 files changed, 104 insertions(+), 8 deletions(-) create mode 100644 core/src/test/java/org/apache/struts2/...
null
CVE-2016-4565
The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relies on the write system call, which allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface.
[ { "commit_message": "[PATCH] IB/security: Restrict use of the write() interface The drivers/infiniband stack uses write() as a replacement for bi-directional ioctl(). This is not safe. There are ways to trigger write calls that result in the return structure that is normally written to user space being shunted...
n/a
CVE-2014-3186
Buffer overflow in the picolcd_raw_event function in devices/hid/hid-picolcd_core.c in the PicoLCD HID device driver in the Linux kernel through 3.16.3, as used in Android on Nexus 7 devices, allows physically proximate attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a crafted device that sends a large report.
[ { "commit_message": "[PATCH] HID: picolcd: sanity check report size in raw_event() callback The report passed to us from transport driver could potentially be arbitrarily large, therefore we better sanity-check it so that raw_data that we hold in picolcd_pending structure are always kept within proper bounds. C...
n/a
CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
[ { "commit_message": "[PATCH] kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack ...
n/a
GHSA-237r-mx84-7x8c
VNCAuthProxy authentication bypass vulnerability
null
[ { "commit_message": "[PATCH] Fix CVE-2022-36436 - Authentication bypass in RFB security handshake (#1) vncap/tests/test_protocol.py | 16 +++++++++++++++- vncap/vnc/protocol.py | 7 ++----- 2 files changed, 17 insertions(+), 6 deletions(-)", "patch_text_b64": "RnJvbSBlZGMxNDlhZjI5MjQyMTc4MDkxYjJkNmZjZ...
null
CVE-2023-26861
SQL injection vulnerability found in PrestaShop vivawallet v.1.7.10 and before allows a remote attacker to gain privileges via the vivawallet() module.
[ { "commit_message": "[PATCH] Remove Old Prestashop Smart checkout .../prestashop1.5-1.6/vivawallet/access.png | Bin 694 -> 0 bytes .../prestashop1.5-1.6/vivawallet/config.xml | 12 - .../prestashop1.5-1.6/vivawallet/dollar.gif | Bin 358 -> 0 bytes .../prestashop1.5-1.6/vivawallet/fail.php | 66 -- ......
n/a
CVE-2022-1106
use after free in mrb_vm_exec in mruby/mruby
use after free in mrb_vm_exec in GitHub repository mruby/mruby prior to 3.2.
[ { "commit_message": "[PATCH] vm.c: vm.c: stack may be reallocated in functions calls; aaa28a5 `mrb_range_new()` also calls VM recursively. src/vm.c | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA3ZjVhNDkwZDA5ZjRkNTY4MDFhYzNhM2U0ZTM5ZTAzZTE0NzFiNDRjIE1vbiBTZXAgMTcgMDA6...
CWE-416 Use After Free