id
stringlengths
12
19
title
stringlengths
0
237
description
stringlengths
35
3.87k
patches
listlengths
1
22
cwe
stringlengths
2
440
GHSA-grvw-q343-58wh
Out-of-bounds write
null
[ { "commit_message": "[PATCH 1/8] [CVE-2019-1217] .../ByteCodeCacheReleaseFileVersion.h | 4 +- .../Library/InJavascript/Intl.js.bc.32b.h | 10096 +++++++--------- .../Library/InJavascript/Intl.js.bc.64b.h | 10094 +++++++-------- lib/Runtime/Library/JsBuiltIn/JsBuiltIn.js | 16 +- .../Libr...
null
GHSA-m4vv-p6fq-jhqp
Directory Traversal in @vivaxy/here
null
[ { "commit_message": "[PATCH 1/2] fix: :lock:Fix an issue that users can browse outside the wd Resolve #16 lib/application.js | 21 +++------- lib/build-file-list.js | 78 ++++++------------------------------- lib/config.js | 2 +- lib/open-browser.js | 2 - lib/server.js ...
null
GHSA-2wqw-hr4f-xrhh
RSSHub Cross-site Scripting vulnerability caused by internal media proxy
null
[ { "commit_message": "[PATCH] feat: remove MEDIA_PROXY_KEY and internal media proxy lib/config.ts | 2 - lib/routes/rsshub/maintainer.ts | 1 - lib/routes/rsshub/media.ts | 52 ------------------- lib/routes/rsshub/router.ts | 1 -...
null
CVE-2024-43405
Nuclei Template Signature Verification Bypass
Nuclei is a vulnerability scanner powered by YAML based templates. Starting in version 3.0.0 and prior to version 3.3.2, a vulnerability in Nuclei's template signature verification system could allow an attacker to bypass the signature check and possibly execute malicious code via custom code template. The vulnerabilit...
[ { "commit_message": "[PATCH] Merge commit from fork MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit * fix template signature verification * fix signature pattern check * add tests * remove signature count constraint, check for lines len * Add more tests * Centralize sig...
CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
GHSA-wmwf-9ccg-fff5
Apache Tomcat Vulnerable to Relative Path Traversal
null
[ { "commit_message": "[PATCH] Fix a couple of issues with QSA/QSD handling and associated tests - Original query string was incorrectly retained when there was no new query string and QSD was set - QSD did not take precedence when QSA and QSD were both set Rename variables for consistency / ease of maintenance ....
null
CVE-2025-57765
WeGIA Cross-Site Scripting (XSS) Reflected endpoint 'pre_cadastro_adotante.php' parameter 'msg_e'
WeGIA is a Web manager for charitable institutions. Prior to 3.4.7, a Reflected Cross-Site Scripting (XSS) vulnerability was identified in the pre_cadastro_adotante.php endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the msg_e parameter. This vulnerability is fixed ...
[ { "commit_message": "[PATCH] =?UTF-8?q?Resolu=C3=A7=C3=A3o=20XSS=20em=20html/geral/car?= =?UTF-8?q?gos.php=20[Security=20https://github.com/LabRedesCefetRJ/WeGIA/?= =?UTF-8?q?security/advisories/GHSA-rxf5-57q6-gfx7]?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit html...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-27507
IDOR Vulnerabilities in ZITADEL's Admin API that Primarily Impact LDAP Configurations
The open-source identity infrastructure software Zitadel allows administrators to disable the user self-registration. ZITADEL's Admin API contains Insecure Direct Object Reference (IDOR) vulnerabilities that allow authenticated users, without specific IAM roles, to modify sensitive settings. While several endpoints are...
[ { "commit_message": "[PATCH] Merge commit from fork proto/zitadel/admin.proto | 24 ++++++++++++------------ 1 file changed, 12 insertions(+), 12 deletions(-)", "patch_text_b64": "RnJvbSBkOWQ4MzM5ODEzZjFjNDNkM2ViN2Q4ZDgwZjExZmRhYmIyZmQyZWU0IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBMaXZpbyBTcHJpbmcgPGxpdmlvL...
CWE-639: Authorization Bypass Through User-Controlled Key
GHSA-r6gp-rff2-p3hf
llama-index-core Command Injection vulnerability
null
[ { "commit_message": "[PATCH] stricter access to builting in pandas query engine (#12278) .../llama_index/core/exec_utils.py | 32 +++++++++++++++---- .../tests/query_engine/test_pandas.py | 5 ++- 2 files changed, 27 insertions(+), 10 deletions(-)", "patch_text_b64": "RnJvbSAyYzkyZTg4ODM4Y...
null
CVE-2014-10068
The inert directory handler in inert node module before 1.1.1 always allows files in hidden directories to be served, even when `showHidden` is false.
[ { "commit_message": "[PATCH] Don't allow files in hidden directories to be served lib/directory.js | 2 +- package.json | 2 +- test/directory.js | 52 +++++++++++++++++++++++++++++++++++++++++++++-- 3 files changed, 52 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSAwODkzMWZjZWY3ZTY3YjNmNmFh...
Path Traversal (CWE-22)
CVE-2020-24240
GNU Bison before 3.7.1 has a use-after-free in _obstack_free in lib/obstack.c (called from gram_lex) when a '\0' byte is encountered. NOTE: there is a risk only if Bison is used with untrusted input, and the observed bug happens to cause unsafe behavior with a specific compiler/architecture. The bug report was intended...
[ { "commit_message": "[PATCH] scanner: don't crash on strings containing a NUL byte We crash if the input contains a string containing a NUL byte. Reported by Suhwan Song. https://lists.gnu.org/r/bug-bison/2020-07/msg00051.html * src/flex-scanner.h (STRING_FREE): Avoid accidental use of last_string. * src/scan-g...
n/a
GHSA-748r-5r8q-273m
Apache Superset allows authenticated users to access metadata they have no permission to
null
[ { "commit_message": "[PATCH] fix: Alpha should not be able to edit datasets that they don't own (#19854) * fix api for checking owners * fix styles for disabling * fix styles for disabling * fix lint * fix lint * add owners key * plzz * remove * update test * add tooltip * add type * fix test * fix user referen...
null
CVE-2025-53099
Sentry Missing Invalidation of Authorization Codes During OAuth Exchange and Revocation
Sentry is a developer-first error tracking and performance monitoring tool. Prior to version 25.5.0, an attacker with a malicious OAuth application registered with Sentry can take advantage of a race condition and improper handling of authorization code within Sentry to maintain persistence to a user's account. With a ...
[ { "commit_message": "[PATCH] fix(oauth): add locking to prevent race conditions in grant exchange (#85570) Pulled from #82052 to break out these changes into smaller PRs. Use locks to ensure an `ApiGrant` cannot be used twice during a race condition that would result in multiple access/refresh token pairs. src/...
CWE-288: Authentication Bypass Using an Alternate Path or Channel
GHSA-4j5h-mvj3-m48v
Star Citizen EmbedVideo Extension Stored XSS through wikitext caused by usage of non-reserved data attributes
null
[ { "commit_message": "[PATCH] Merge commit from fork Data attributes starting with data-mw- cannot be inserted via wikitext. This fixes a stored XSS vulnerability. GHSA-4j5h-mvj3-m48v includes/EmbedService/EmbedHtmlFormatter.php | 2 +- includes/EmbedVideo.php | 2 +- resourc...
null
CVE-2025-54377
Roo Code Lacks Line Break Validation in its Command Execution Tool
Roo Code is an AI-powered autonomous coding agent that lives in users' editors. In versions 3.23.18 and below, RooCode does not validate line breaks (\n) in its command input, allowing potential bypass of the allow-list mechanism. The project appears to lack parsing or validation logic to prevent multi-line command inj...
[ { "commit_message": "[PATCH] Split commands on newlines (#6121) .../__tests__/command-validation.spec.ts | 115 ++++++++++++++++++ webview-ui/src/utils/command-validation.ts | 26 +++- 2 files changed, 140 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA5ZDQzNGMyZGI5YjIwZWI1Yzc4YjY5OGNiMmIwM...
CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')
PYSEC-2024-234
null
[ { "commit_message": "[PATCH] Check authentication when websockets open jupyter_server_proxy/handlers.py | 36 +++++++++++++++++++++++++++++--- tests/test_proxies.py | 22 ++++++++++++++----- 2 files changed, 50 insertions(+), 8 deletions(-)", "patch_text_b64": "RnJvbSBhZmE1NzUwMjhjYmM5NWFkMDlhYWY5Z...
null
GHSA-mr6h-7x2m-rgmq
SQL injection in librenms/librenms
null
[ { "commit_message": "[PATCH] Fix MAC search sql injection (#15402) unparameterized variable includes/html/table/address-search.inc.php | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA5MDhhZWY2NTk2N2NlNjE4NGJkYzU4N2ZkMTA1NjYwZDVkNTUxMjllIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGc...
null
CVE-2019-5748
In Traccar Server version 4.2, protocol/SpotProtocolDecoder.java might allow XXE attacks.
[ { "commit_message": "[PATCH] Fix potential security issue src/org/traccar/protocol/SpotProtocolDecoder.java | 11 +++++++++-- 1 file changed, 9 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBkN2Y2YzUzZmQ4ODYzNTg4NTkxNDAxMzY0OWI2ODA3ZWM1MzIyN2JmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBbnRvbiBUYW...
n/a
CVE-2025-58761
Tautulli vulnerable to Unauthenticated Path Traversal in `real_pms_image_proxy`
Tautulli is a Python based monitoring and tracking tool for Plex Media Server. The `real_pms_image_proxy` endpoint in Tautulli v2.15.3 and prior is vulnerable to path traversal, allowing unauthenticated attackers to read arbitrary files from the application server's filesystem. The `real_pms_image_proxy` is used to fet...
[ { "commit_message": "[PATCH] Validate image format in pms_image_proxy plexpy/webserve.py | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBlYzc3YTcwYWFmYzU1NWUxYWFkMGQ5OTgxZjcxOWQxMjAwYzExN2YxIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBKb25ueVdvbmcxNiA8OTA5OTM0MitKb25ueVdvb...
CWE-27: Path Traversal: 'dir/../../filename'
CVE-2022-21654
Incorrect configuration handling allows TLS session re-use without re-validation in Envoy
Envoy is an open source edge and service proxy, designed for cloud-native applications. Envoy's tls allows re-use when some cert validation settings have changed from their default configuration. The only workaround for this issue is to ensure that default tls settings are used. Users are advised to upgrade.
[ { "commit_message": "[PATCH] CVE-2022-21654 tls allows re-use when some cert validation settings have changed Signed-off-by: Yan Avlasov <yavlasov@google.com> .../certificate_validation_context_config.h | 5 + .../tls/cert_validator/cert_validator.h | 5 +- .../tls/cert_validator/default_validator.cc ...
CWE-295: Improper Certificate Validation
GHSA-pj25-83q9-ppf3
null
[ { "commit_message": "[PATCH] Admin: Escape attachment name in case it contains special characters Built from https://develop.svn.wordpress.org/trunk@37774 git-svn-id: http://core.svn.wordpress.org/trunk@37739 1a063a9b-81f0-0310-95a4-ce76da25c4cd wp-admin/includes/class-wp-media-list-table.php | 2 +- wp-includes...
null
CVE-2023-46239
quic-go vulnerable to pointer dereference that can lead to panic
quic-go is an implementation of the QUIC protocol in Go. Starting in version 0.37.0 and prior to version 0.37.3, by serializing an ACK frame after the CRYTPO that allows a node to complete the handshake, a remote node could trigger a nil pointer dereference (leading to a panic) when the node attempted to drop the Hands...
[ { "commit_message": "[PATCH] fix handling of ACK frames serialized after CRYPTO frames (#4018) connection.go | 31 ++++++++++++++++++++----- connection_test.go | 57 ++++++++++------------------------------------ 2 files changed, 37 insertions(+), 51 deletions(-)", "patch_text_b64": "RnJvbSBiNmE0NzI1YjYw...
CWE-248: Uncaught Exception
CVE-2014-125054
koroket RedditOnRails Vote access control
A vulnerability classified as critical was found in koroket RedditOnRails. This vulnerability affects unknown code of the component Vote Handler. The manipulation leads to improper access controls. The attack can be initiated remotely. The patch is identified as 7f3c7407d95d532fcc342b00d68d0ea09ca71030. It is recommend...
[ { "commit_message": "[PATCH] Solved duplicate votes issue; Discovered karma exploitation Exploit - Currently even if you already upvoted you can click the upvote button again, which doesn't add a new vote to the post/comment but *does* add more to the user's karma since there's no check for existing vote value ...
CWE-284 Improper Access Controls
CVE-2023-1976
Password Aging with Long Expiration in answerdev/answer
Password Aging with Long Expiration in GitHub repository answerdev/answer prior to 1.0.6.
[ { "commit_message": "[PATCH] update VerifyCaptcha internal/repo/captcha/captcha.go | 8 ++++++++ internal/service/action/captcha_service.go | 7 +++++++ 2 files changed, 15 insertions(+)", "patch_text_b64": "RnJvbSA4MTNhZDBiOTg5NDY3M2IxYmRkNDg5YTJlOWFiNjBhNDRmZTk5MGFmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAw...
CWE-263 Password Aging with Long Expiration
CVE-2017-14230
In the mboxlist_do_find function in imap/mboxlist.c in Cyrus IMAP before 3.0.4, an off-by-one error in prefix calculation for the LIST command caused use of uninitialized memory, which might allow remote attackers to obtain sensitive information or cause a denial of service (daemon crash) via a 'LIST "" "Other Users"' ...
[ { "commit_message": "[PATCH] mboxlist: fix uninitialised memory use where pattern is \"Other Users\" imap/mboxlist.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA2YmQzMzI3NTM2OGVkZmE3MWFlMTE3ZGU4OTU0ODg1ODQ2NzhhYzc5IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBCcm9uIEdvbmR3Y...
n/a
GHSA-r2j8-v967-j6h6
null
[ { "commit_message": "[PATCH] vm.c: vm.c: stack may be reallocated in functions calls; aaa28a5 `mrb_range_new()` also calls VM recursively. src/vm.c | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA3ZjVhNDkwZDA5ZjRkNTY4MDFhYzNhM2U0ZTM5ZTAzZTE0NzFiNDRjIE1vbiBTZXAgMTcgMDA6...
null
GHSA-4ppg-2mx6-fqx9
Moodle allows attackers to bypass intended login restrictions
null
[ { "commit_message": "[PATCH] MDL-50090 user: suspended user can login upon conrimation login/confirm.php | 14 ++++++++------ 1 file changed, 8 insertions(+), 6 deletions(-)", "patch_text_b64": "RnJvbSA3OGVjNjc1MWZjNTdiYjE3YmI2N2MyNjg3MGZlYTM5NjM5MGI5OTM3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBNYXJpbmEgR2...
null
CVE-2016-10156
A flaw in systemd v228 in /src/basic/fs-util.c caused world writable suid files to be created when using the systemd timers features, allowing local attackers to escalate their privileges to root. This is fixed in v229.
[ { "commit_message": "[PATCH] basic: fix touch() creating files with 07777 mode mode_t is unsigned, so MODE_INVALID < 0 can never be true. This fixes a possible DoS where any user could fill /run by writing to a world-writable /run/systemd/show-status. src/basic/fs-util.c | 3 ++- 1 file changed, 2 insertions(+),...
n/a
CVE-2020-1913
An Integer signedness error in the JavaScript Interpreter in Facebook Hermes prior to commit 2c7af7ec481ceffd0d14ce2d7c045e475fd71dc6 allows attackers to cause a denial of service attack or a potential RCE via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of u...
[ { "commit_message": "[PATCH] Fix backward branching in SwitchImm. Summary: `SwitchImm` can subtract from `ip`, but it was reading the offset from a `uint32_t *` instead of `int32_t *`. Change the type to the correct one. Reviewed By: dulinriley Differential Revision: D23114516 fbshipit-source-id: d4ddab94eb16dc...
CWE-195: Signed to Unsigned Conversion Error
CVE-2017-6502
An issue was discovered in ImageMagick 6.9.7. A specially crafted webp file could lead to a file-descriptor leak in libmagickcore (thus, a DoS).
[ { "commit_message": "[PATCH] Fixed fd leak for webp coder (patch from #382) ChangeLog | 4 ++++ coders/webp.c | 1 + 2 files changed, 5 insertions(+)", "patch_text_b64": "RnJvbSAxMjZjN2M5OGVhNzg4MjQxOTIyYzMwZGY0YTU2MzNlYTY5MmNmOGRmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBEaXJrIExlbXN0cmEgPGRpcmtAZ2l0Lml...
n/a
GHSA-8hpx-q4cx-gfxw
null
[ { "commit_message": "[PATCH] [DBI] Fix crash in ogs_dbi_auth_info due to invalid SUPI (#3635) Added checks to validate the SUPI ID in the ogs_dbi_auth_info function before calling ogs_assert. This prevents a crash when the SUPI ID is malformed, such as when it does not contain a hyphen. The fix ensures that inv...
null
GHSA-543w-gq76-pw7g
Cross-Site Request Forgery in Jenkins Build Failure Analyzer Plugin
null
[ { "commit_message": "[PATCH] [SECURITY-1651] Protect BuildLogIndication doMatchText Permission check and require post. .../model/indication/BuildLogIndication.java | 8 +- .../indication/BuildLogIndicationTest.java | 102 ++++++++++++++++++ 2 files changed, 109 insertions(+), 1 deletion(-)", "patch_text...
null
CVE-2015-5273
The abrt-action-install-debuginfo-to-abrt-cache help program in Automatic Bug Reporting Tool (ABRT) before 2.7.1 allows local users to write to arbitrary files via a symlink attack on unpacked.cpio in a pre-created directory with a predictable name in /var/tmp.
[ { "commit_message": "[PATCH] a-a-i-d-to-abrt-cache: make own random temporary directory The set-user-ID wrapper must use own new temporary directory in order to avoid security issues with unpacking specially crafted debuginfo packages that might be used to create files or symlinks anywhere on the file system as...
n/a
CVE-2024-50355
LibreNMS has a Persistent XSS from Insecure Input Sanitization Affects Multiple Endpoints
LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. User with Admin role can edit the Display Name of a device, the application did not properly sanitize the user input in the device Display Name, if java script code is inside the name of the device Display Name, its can be trigger from differen...
[ { "commit_message": "[PATCH] Fix device display name xss vulnerabilities (#16575) * Fix device display name xss vulnerabilities of note is we now strip tags in overlib popups because it is extremely difficult for htmlentities alone to fix the issue due to overlib injecting it into the dom decoded. https://githu...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-wrvc-72w7-xpmj
Incorrect Comparison in sodiumoxide
null
[ { "commit_message": "[PATCH] Initial bindings for crypto_generichash src/crypto/generichash/digest.rs | 124 +++++++++++++++++++++++++++++++ src/crypto/generichash/mod.rs | 86 +++++++++++++++++++++ src/lib.rs | 1 + 3 files changed, 211 insertions(+) create mode 100644 src/crypto/gener...
null
CVE-2021-43846
CSRF forgery protection bypass for Spree::OrdersController#populate
`solidus_frontend` is the cart and storefront for the Solidus e-commerce project. Versions of `solidus_frontend` prior to 3.1.5, 3.0.5, and 2.11.14 contain a cross-site request forgery (CSRF) vulnerability that allows a malicious site to add an item to the user's cart without their knowledge. Versions 3.1.5, 3.0.5, and...
[ { "commit_message": "[PATCH] Protect `Spree::OrdersController#populate` against CSRF attacks See https://github.com/solidusio/solidus/security/advisories/GHSA-h3fg-h5v3-vf8m for all the details. Some time ago, all order actions were left out of CSRF protection (see 95ea57058ab1c5e722b327b10747cd41e68a4deb). The...
CWE-352: Cross-Site Request Forgery (CSRF)
CVE-2014-125037
License to Kill injury.rb sql injection
A vulnerability, which was classified as critical, was found in License to Kill. This affects an unknown part of the file models/injury.rb. The manipulation of the argument name leads to sql injection. The patch is named cd11cf174f361c98e9b1b4c281aa7b77f46b5078. It is recommended to apply a patch to fix this issue. The...
[ { "commit_message": "[PATCH] Fix the SQL injection! STRING INTERPOLATION - NEVER AGAIN. NEVER! lib/database.rb | 4 ++-- models/injury.rb | 12 ++++++------ spec/injury_integration_spec.rb | 3 +++ 3 files changed, 11 insertions(+), 8 deletions(-)", "patch_text_b64": "RnJvbSBjZ...
CWE-89 SQL Injection
CVE-2018-0500
Curl_smtp_escape_eob in lib/smtp.c in curl 7.54.1 to and including curl 7.60.0 has a heap-based buffer overflow that might be exploitable by an attacker who can control the data that curl transmits over SMTP with certain settings (i.e., use of a nonstandard --limit-rate argument or CURLOPT_BUFFERSIZE value).
[ { "commit_message": "[PATCH] smtp: use the upload buffer size for scratch buffer malloc ... not the read buffer size, as that can be set smaller and thus cause a buffer overflow! CVE-2018-0500 Reported-by: Peter Wu Bug: https://curl.haxx.se/docs/adv_2018-70a2.html lib/smtp.c | 3 ++- 1 file changed, 2 insertions...
heap-based buffer overflow
CVE-2022-33127
The function that calls the diff tool in Diffy 3.4.1 does not properly handle double quotes in a filename when run in a windows environment. This allows attackers to execute arbitrary commands via a crafted string.
[ { "commit_message": "[PATCH] Remove windows specific exec. Open2.capture3 should work on all platforms. lib/diffy/diff.rb | 8 +------- 1 file changed, 1 insertion(+), 7 deletions(-)", "patch_text_b64": "RnJvbSA0NzhmMzkyMDgyYjY2ZDM4ZjU0YTAyYjRiYjljNDFiZTMyZmQ2NTkzIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBT...
n/a
GHSA-5jqp-fwpp-hvwv
null
[ { "commit_message": "[PATCH] Avoid accessing the DebugInfo for BCProviderLazy Summary: Fixes CVE-2023-24832 by avoiding accessing the DebugInfo for lazy CodeBlocks. Reviewed By: mattbfb Differential Revision: D42688370 fbshipit-source-id: fc7eb4168b1f21549cbfd080a9e010c6d8609256 .../BCGen/HBC/BytecodeProviderFr...
null
CVE-2015-7509
fs/ext4/namei.c in the Linux kernel before 3.7 allows physically proximate attackers to cause a denial of service (system crash) via a crafted no-journal filesystem, a related issue to CVE-2013-2015.
[ { "commit_message": "[PATCH] ext4: make orphan functions be no-op in no-journal mode Instead of checking whether the handle is valid, we check if journal is enabled. This avoids taking the s_orphan_lock mutex in all cases when there is no journal in use, including the error paths where ext4_orphan_del() is call...
n/a
GHSA-4qvx-qq5w-695p
HashiCorp Consul can use cleartext agent-to-agent RPC communication
null
[ { "commit_message": "[PATCH] Documentation and changes for `verify_server_hostname` (#5069) * verify_server_hostname implies verify_outgoing * mention CVE in the docs. agent/config/builder.go | 16 +++++++- agent/config/runtime_test.go | 18 +++++++++ tlsutil/config.go ...
null
GHSA-mgh9-4mwp-fg55
OpenFGA Authorization Bypass
null
[ { "commit_message": "[PATCH] fix: multiple userset with same type should not use weight 2 opt (#2643) CHANGELOG.md | 2 + assets/tests/consolidated_1_1_tests.yaml | 52 ++++++++++++++++++++++++ internal/graph/check.go | 5 ++- 3 files changed, 58 insertions(+), 1 dele...
null
GHSA-wv7g-xhvw-8hcp
Apache Struts directory traversal vulnerability
null
[ { "commit_message": "[PATCH] WW-2779 Directory traversal vulnerability while serving static content git-svn-id: https://svn.apache.org/repos/asf/struts/struts2/trunk@687425 13f79535-47bb-0310-9956-ffa450edef68 .../DefaultStaticContentLoader.java | 24 ++++++++++++++----- .../dispatcher/StaticContentLo...
null
CVE-2011-1488
A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages are logged when $RepeatedMsgReduction was enabled. A local attacker could use this flaw to cause a denial of the rsyslogd daemon service by crashing the service via a sequence of repeated log messages sent within short periods of t...
[ { "commit_message": "[PATCH] bugfix: fixed a memory leak and potential abort condition this could happen if multiple rulesets were used and some output batches contained messages belonging to more than one ruleset. fixes: http://bugzilla.adiscon.com/show_bug.cgi?id=226 fixes: http://bugzilla.adiscon.com/show_bu...
Memory Leak
CVE-2020-36254
scp.c in Dropbear before 2020.79 mishandles the filename of . or an empty filename, a related issue to CVE-2018-20685.
[ { "commit_message": "[PATCH] scp.c: Port OpenSSH CVE-2018-20685 fix (#80) scp.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA4ZjhhM2RmZjcwNWZhZDc3NGExMDg2NGEyZTNkYmNmYTk3NzljZWZmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBIYWVsd2VubiBNb25uaWVyIDxjb250YWN0K2dpdGh1Yi5jb21A...
n/a
GHSA-mgmm-cmhj-2h5f
modoboa Cross-site Scripting vulnerability
null
[ { "commit_message": "[PATCH] Fixed XSS vulnerability modoboa/static/js/listing.js | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSAwNWI0YTRmODY1YzgyMWI0ZDE3ODBhYzRhMWYwMDQzMjUzNGFiYWZhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBbnRvaW5lIE5ndXllbiA8dG9uaW9Abmd5bi5vcmc+CkRh...
null
CVE-2021-41274
Authentication Bypass by CSRF Weakness
solidus_auth_devise provides authentication services for the Solidus webstore framework, using the Devise gem. In affected versions solidus_auth_devise is subject to a CSRF vulnerability that allows user account takeover. All applications using any version of the frontend component of `solidus_auth_devise` are affected...
[ { "commit_message": "[PATCH] Fix account takeover through CSRF attack This commit fixes an account takeover vulnerability when [Rails `protect_from_forgery`](https://api.rubyonrails.org/classes/ActionController/RequestForgeryProtection/ClassMethods.html) method is both: - Executed whether as: - A `before_action...
CWE-352: Cross-Site Request Forgery (CSRF)
GHSA-22qq-3xwm-r5x4
CometBFT allows a malicious peer to make node stuck in blocksync
null
[ { "commit_message": "[PATCH] Merge commit from fork lower than what was previously reported https://github.com/cometbft/cometbft/security/advisories/GHSA-22qq-3xwm-r5x4 ...s-peer-can-make-node-stuck-in-blocksync.md | 2 + internal/blocksync/pool.go | 12 +- internal/blocksync/pool_test.go ...
null
GHSA-4jhm-5f7g-75fp
Improper Limitation of a Pathname to a Restricted Directory in Jenkins
null
[ { "commit_message": "[PATCH] [SECURITY-1072] core/src/main/java/hudson/model/User.java | 908 ++++++++---------- .../main/java/hudson/model/UserIdMapper.java | 201 ++++ .../java/hudson/model/UserIdMigrator.java | 104 ++ .../main/java/jenkins/model/IdStrategy.java | 391 +------- .../java/hudson/model/T...
null
GHSA-qrm8-cw73-r9w8
RCE vulnerability in Jenkins AWS SAM Plugin
null
[ { "commit_message": "[PATCH] [SECURITY-1736] pom.xml | 2 +- .../jenkins/plugins/sam/util/IntrinsicsYamlConstructor.java | 4 ++-- 2 files changed, 3 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSA2ZGRjYjAyOTYzOGI1YWYwNWRmNzAxYTExMTM5ZDZhNmMwM...
null
GHSA-vgf9-rc5w-fw25
null
[ { "commit_message": "[PATCH] Update conference_profile_params.php app/conference_profiles/conference_profile_params.php | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSAwMjFmZjhmOGU1MWNkMTI1NGQxOWU4OGU3YWVkYzRiNzk1MDY3ZjhkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBGdXNpb2...
null
CVE-2014-1859
(1) core/tests/test_memmap.py, (2) core/tests/test_multiarray.py, (3) f2py/f2py2e.py, and (4) lib/tests/test_io.py in NumPy before 1.8.1 allow local users to write to arbitrary files via a symlink attack on a temporary file.
[ { "commit_message": "[PATCH] ENH: remove insecure mktemp use mktemp only returns a filename, a malicous user could replace it before it gets used. numpy/core/tests/test_memmap.py | 34 ++++++++++++++--------------- numpy/core/tests/test_multiarray.py | 13 +++-------- numpy/f2py/__init__.py | 26 ...
n/a
GHSA-mv2m-5r86-9xcj
null
[ { "commit_message": "[PATCH] master: avoid an endless loop in HTML generation Safeguard to avoid any bigger loop than 100 nested levels. It protects against application bugs in the parsing code. Thx Christoph Biedl (debian.axhn@manchmal.in-ulm.de) for noticing and for providing a patch Closes: C:CVE-2013-6048 m...
null
CVE-2022-29174
Predictable password reset token may lead to account takeover in countly-server
countly-server is the server-side part of Countly, a product analytics solution. Prior to versions 22.03.7 and 21.11.4, a malicious actor who knows an account email address/username and full name specified in the database is capable of guessing the password reset token. The actor may use this information to reset the p...
[ { "commit_message": "[PATCH] [members] secure password reset token generation frontend/express/libs/members.js | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAyYmZhMWVlMWZhNDZlOWJiMDA3Y2Y4Njg3YWQxOTdhYjljNjA0OTk5IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBcnR1cnMgU29zaW5zIDx...
CWE-640: Weak Password Recovery Mechanism for Forgotten Password
CVE-2025-3159
Open Asset Import Library Assimp ASE File ASEParser.cpp ParseLV4MeshBonesVertices heap-based overflow
A vulnerability, which was classified as critical, was found in Open Asset Import Library Assimp 5.4.3. This affects the function Assimp::ASE::Parser::ParseLV4MeshBonesVertices of the file code/AssetLib/ASE/ASEParser.cpp of the component ASE File Handler. The manipulation leads to heap-based buffer overflow. The attack...
[ { "commit_message": "[PATCH] ASE: Use correct vertex container (#6051) - closes https://github.com/assimp/assimp/issues/6024 code/AssetLib/ASE/ASEParser.cpp | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBlOGE2Mjg2NTQyOTI0ZTYyOGUwMjc0OWM0ZjVhYzRmOTFmZGFlNzFiIE1vbiBTZXAgM...
Heap-based Buffer Overflow
CVE-2023-5591
SQL Injection in librenms/librenms
SQL Injection in GitHub repository librenms/librenms prior to 23.10.0.
[ { "commit_message": "[PATCH] Fix MAC search sql injection (#15402) unparameterized variable includes/html/table/address-search.inc.php | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA5MDhhZWY2NTk2N2NlNjE4NGJkYzU4N2ZkMTA1NjYwZDVkNTUxMjllIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGc...
CWE-89 Improper Neutralization of Special Elements used in an SQL Command
CVE-2025-46730
Mobile Security Framework (MobSF) Allows Web Server Resource Exhaustion via ZIP of Death Attack
MobSF is a mobile application security testing tool used. Typically, MobSF is deployed on centralized internal or cloud-based servers that also host other security tools and web applications. Access to the MobSF web interface is often granted to internal security teams, audit teams, and external vendors. MobSF provide...
[ { "commit_message": "[PATCH] v4.3.3 Security Updates (#2518) * Fix GHSA-mwfg-948f-2cc5 * stricter email case validation * Fix GHSA-c5vg-26p8-q8cr * Bump deps * Lint QA .github/SECURITY.md | 2 + .github/workflows/codeql-analysis.yml | 48 +++- mobsf/MobSF/forms.py ...
CWE-409: Improper Handling of Highly Compressed Data (Data Amplification)
CVE-2022-4813
Insufficient Granularity of Access Control in usememos/memos
Insufficient Granularity of Access Control in GitHub repository usememos/memos prior to 0.9.1.
[ { "commit_message": "[PATCH] fix: access control (#870) api/memo.go | 8 +- api/memo_organizer.go | 10 +- api/memo_resource.go | 2 +- api/resource.go | 2 +- api/shortcut.go | 2 +- api/tag.go | 2 +- api/user_setting.go | 2 +- server/auth.go | 6 +- server/m...
CWE-1220 Insufficient Granularity of Access Control
PYSEC-2022-12
null
[ { "commit_message": "[PATCH 1/3] FIX CVE-2022-21699 See https://github.com/ipython/ipython/security/advisories/GHSA-pq7m-3gw7-gq5x IPython/__init__.py | 4 +++ IPython/core/application.py | 2 +- IPython/core/profileapp.py | 7 +++--- IPython/core/profiledir.py | 4 +-- docs/so...
null
GHSA-fpgj-cr28-fvpx
CWA-2024-006: wasmd non-deterministic module_query_safe query
null
[ { "commit_message": "[PATCH] Fix app/sim_test.go | 1 - proto/cosmwasm/wasm/v1/query.proto | 3 +- x/wasm/keeper/handler_plugin.go | 14 ++ x/wasm/keeper/keeper.go | 20 +++ x/wasm/keeper/keeper_cgo.go | 3 + x/wasm/keeper/options.go | 6 + x/wasm/keep...
null
GHSA-7pg4-5233-82jv
Zend Framework XXE Vulnerability
null
[ { "commit_message": "[PATCH] [ZF-12293] Ensure XML-RPC response does not load entities Merges r24975 - Disable loading external entities - Does not affect actual internal functionality, but could be used as a potential local DoS on clients git-svn-id: http://framework.zend.com/svn/framework/standard/branches/re...
null
CVE-2020-5269
Reflected XSS on AdminFeatures page of PrestaShop
In PrestaShop between versions 1.7.6.1 and 1.7.6.5, there is a reflected XSS on AdminFeatures page by using the `id_feature` parameter. The problem is fixed in 1.7.6.5
[ { "commit_message": "[PATCH] Escape the document location link and always cast ids .../themes/default/template/helpers/list/list_content.tpl | 2 +- controllers/admin/AdminFeaturesController.php | 4 ++-- 2 files changed, 3 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSAzOWJhNzl...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-cxm3-wv7p-598c
Malicious versions of Nx were published
null
[ { "commit_message": "[PATCH] [skip ci] Update publish-resolve-data.js scripts/publish-resolve-data.js | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+)", "patch_text_b64": "RnJvbSAzOTA1NDc1Y2ZkMGUwZWE2NzBlMjBjNmE5ZWFlYjc2ODE2OWRjMzNkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBTdHJpa2VPbWVnYTA...
null
GHSA-gcmq-7652-x98j
thorsten/phpmyfaq vulnerable to stored cross-site scripting (XSS) via adminlog
null
[ { "commit_message": "[PATCH] fix: added missing conversion to HTML entities phpmyfaq/admin/stat.adminlog.php | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSBlMDE4ODIzZjhlM2JjYTEwM2MxMWU1YTk4YjBkZDQ2OWU0MWVkNDE3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBUaG9yc3RlbiBSaW5...
null
GHSA-4j99-9c7q-m4qw
null
[ { "commit_message": "[PATCH] Propagate allocation failure from ogg_sync_buffer. Instead of segfault, report OP_EFAULT if ogg_sync_buffer returns a null pointer. This allows more graceful recovery by the caller in the unlikely event of a fallible ogg_malloc call. We do check the return value elsewhere in the cod...
null
GHSA-f3gh-529w-v32x
IDOR Vulnerabilities in ZITADEL's Admin API that Primarily Impact LDAP Configurations
null
[ { "commit_message": "[PATCH] Merge commit from fork proto/zitadel/admin.proto | 24 ++++++++++++------------ 1 file changed, 12 insertions(+), 12 deletions(-)", "patch_text_b64": "RnJvbSBkOWQ4MzM5ODEzZjFjNDNkM2ViN2Q4ZDgwZjExZmRhYmIyZmQyZWU0IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBMaXZpbyBTcHJpbmcgPGxpdmlvL...
null
CVE-2025-25199
BCryptGenerateSymmetricKey memory leak
go-crypto-winnative Go crypto backend for Windows using Cryptography API: Next Generation (CNG). Prior to commit f49c8e1379ea4b147d5bff1b3be5b0ff45792e41, calls to `cng.TLS1PRF` don't release the key handle, producing a small memory leak every time. Commit f49c8e1379ea4b147d5bff1b3be5b0ff45792e41 contains a fix for the...
[ { "commit_message": "[PATCH] destroy key handle when exiting cng.TLS1PRF cng/tls1prf.go | 1 + 1 file changed, 1 insertion(+)", "patch_text_b64": "RnJvbSAxODMyN2YxMmM5OTYxZjlmNzVlZDVjNDJlODA2NzI0ZDc0NGQ2NWRhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBxbXVudGFsIDxxbXVudGFsZGlhekBtaWNyb3NvZnQuY29tPgpEYXRlOiBUdW...
CWE-401: Missing Release of Memory after Effective Lifetime
CVE-2024-52595
HTML Cleaner allows crafted scripts in special contexts like svg or math to pass through
lxml_html_clean is a project for HTML cleaning functionalities copied from `lxml.html.clean`. Prior to version 0.4.0, the HTML Parser in lxml does not properly handle context-switching for special HTML tags such as `<svg>`, `<math>` and `<noscript>`. This behavior deviates from how web browsers parse and interpret such...
[ { "commit_message": "[PATCH] Scan for JS code also in CSS comments The `Cleaner()` now scans for hidden JavaScript code embedded within CSS comments. In certain contexts, such as within `<svg>` or `<math>` tags, `<style>` tags may lose their intended function, allowing comments like `/* foo */` to potentially b...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-6ffg-mjg7-585x
Umbraco Allows Improper API Access Control to Low-Privilege Users to Data Type Functionality
null
[ { "commit_message": "[PATCH] Merge commit from fork * Bumped version to 15.2.1. # Conflicts: #\tversion.json * Tighten management API endpoint access rules. .../Controllers/DataType/CopyDataTypeController.cs | 3 +++ .../Controllers/DataType/CreateDataTypeController.cs | 5 ++++- .../Controllers...
null
GHSA-82rp-xg3c-hxpx
null
[ { "commit_message": "[PATCH] bug #470, use a dedicated lib to generate random bytes include/functions_session.inc.php | 37 +--- include/random_compat/byte_safe_strings.php | 181 ++++++++++++++++ include/random_compat/cast_to_int.php | 71 +++++++ include/random_compat/error_polyfill.php ...
null
GHSA-9h4h-8w5p-f28w
Go Ethereum Denial of Service
null
[ { "commit_message": "[PATCH] Revert \"cmd/evm: change error msg output to stderr (#17118)\" This reverts commit fb9f7261ec51e38eedb454594fc19f00de1a6834. cmd/evm/compiler.go | 2 +- cmd/evm/disasm.go | 2 +- cmd/evm/internal/compiler/compiler.go | 5 ++--- cmd/evm/runner.go...
null
GHSA-3638-4f56-qcf5
null
[ { "commit_message": "[PATCH] img2txt: fix an integer overflow in the BMP loader. Fixes: #37 (CVE-2018-20545) Fixes: #40 (CVE-2018-20548) Fixes: #41 (CVE-2018-20549) src/common-image.h | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-)", "patch_text_b64": "RnJvbSAzZTUyZGFiZTNlNjRkYzUwZjQ0MjJlZmZ...
null
CVE-2025-53625
DynamicPageList3 exposes hidden/suppressed usernames
The DynamicPageList3 extension is a reporting tool for MediaWiki, listing category members and intersections with various formats and details. Several #dpl parameters can leak usernames that have been hidden using revision deletion, suppression, or the hideuser block flag. The vulnerability is fixed in 3.6.4.
[ { "commit_message": "[PATCH] Security: fix hiding usernames for hidden users Release version 3.6.4 CHANGELOG.md | 5 +++ extension.json | 2 +- includes/Article.php | 15 +++++--- includes/Query.php | 87 ++++++++++++++++++++++++++++++-------------- 4 files changed, 75 insertions(+), 34 deletions(...
CWE-359: Exposure of Private Personal Information to an Unauthorized Actor
GHSA-cpvc-q5c7-mgxf
null
[ { "commit_message": "[PATCH] Escape message crypt status as we insert it into the DOM The ->{'Value'} part of each message is inserted into the DOM with no escaping (to accommodate MakeClicky and callbacks using HTML). Values RT receives from other systems must be escaped or they leave us vulnerable to an XSS i...
null
PYSEC-2021-636
null
[ { "commit_message": "[PATCH] Fix macros for converting little endian to host for TF_TSRT_OFFSET GetSize Make the macro that converts little endian data do nothing on little endian hosts, and byte swap otherwise. This only affects getting the size of TStrings of type \"Offset\". Added a test for TStrings of type...
null
GHSA-j5fq-p3c6-93jm
null
[ { "commit_message": "[PATCH] feat: Code Interpreter API & File Search Agent Uploads MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit chore: add back code files wip: first pass, abstract key dialog refactor: influence checkbox on key changes refactor: update localization ...
null
CVE-2016-9243
HKDF in cryptography before 1.5.2 returns an empty byte-string if used with a length less than algorithm.digest_size.
[ { "commit_message": "[PATCH] Fixes #3211 -- fixed hkdf's output with short length (#3215) src/cryptography/hazmat/primitives/kdf/hkdf.py | 2 +- tests/hazmat/primitives/test_hkdf.py | 11 +++++++++++ 2 files changed, 12 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBiOTI0Njk2YjJlODczMWYzO...
n/a
GHSA-jv7x-xhv2-p5v2
LaRecipe is vulnerable to Server-Side Template Injection attacks
null
[ { "commit_message": "=?UTF-8?q?=D8=A7=D8=AF?= <saleem_ha@hotmail.com> [PATCH] fix replace links (#390) src/Models/Documentation.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBjMWQwZDU2ODg5NjU1Y2U1ZjI2NDVkYjVhY2YwZTc4ZDVmYzNiMzZiIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOi...
null
GHSA-h24p-w6x4-wgf8
null
[ { "commit_message": "[PATCH] Update SpotPage_login.php For for issue: https://github.com/spotweb/spotweb/issues/718 lib/page/SpotPage_login.php | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAyYmZhMDAxNjg5YWFlOTYwMDk2ODhhMTkzYzY0NDc4NjQ3YmE0NWExIE1vbiBTZXAgMTcgMDA6MDA6...
null
GHSA-xm92-v2mq-842q
Apache Struts improper action name cleanup
null
[ { "commit_message": "[PATCH] Throws away methods that doesn't match pattern .../mapper/DefaultActionMapper.java | 14 ++------- .../mapper/DefaultActionMapperTest.java | 30 +++++++++++++++++-- 2 files changed, 29 insertions(+), 15 deletions(-)", "patch_text_b64": "RnJvbSAyMzc0MzI1MTJkZjBlMjcw...
null
CVE-2022-24122
kernel/ucount.c in the Linux kernel 5.14 through 5.16.4, when unprivileged user namespaces are enabled, allows a use-after-free and privilege escalation because a ucounts object can outlive its namespace.
[ { "commit_message": "[PATCH] ucount: Make get_ucount a safe get_user replacement When the ucount code was refactored to create get_ucount it was missed that some of the contexts in which a rlimit is kept elevated can be the only reference to the user/ucount in the system. Ordinary ucount references exist in pl...
n/a
CVE-2020-8639
An unrestricted file upload vulnerability in keywordsImport.php in TestLink 1.9.20 allows remote attackers to execute arbitrary code by uploading a file with an executable extension. This allows an authenticated attacker to upload a malicious file (containing PHP code to execute operating system commands) to a publicly...
[ { "commit_message": "[PATCH] refactoring for security (www.ackcent.com) lib/keywords/keywordsImport.php | 73 ++++++++++++++++++--------------- 1 file changed, 41 insertions(+), 32 deletions(-)", "patch_text_b64": "RnJvbSA1N2Q4MWFlMzUwZDU2OWM1Yzk1MDg3OTk3ZmUwNTFjNDllMTQ1MTZkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQ...
n/a
GHSA-w2pj-9cgh-mq2c
opencv-contrib-python-headless bundled libwebp binaries in wheels that are vulnerable to CVE-2023-4863
null
[ { "commit_message": "[PATCH] Merge pull request #24274 from vrabaud:webp_1.3.2 Merge pull request #24274 from vrabaud:webp_1.3.2 Bump libwebp to 1.3.2 #24274 This is version [c1ffd9a](https://chromium.googlesource.com/webm/libwebp/+/c1ffd9ac7593894c40a1de99d03f0b7af8af2577) It is 1.3.2 with a few patches that w...
null
GHSA-x9gp-vjh6-3wv6
CKEditor 5 cross-site scripting (XSS) vulnerability in the clipboard package
null
[ { "commit_message": "[PATCH] Use separate implementation of document to render raw elements. .changelog/20250829072109_ck_33.md | 14 ++++++++++++++ .../src/utils/viewtoplaintext.ts | 3 ++- .../tests/utils/viewtoplaintext.js | 19 +++++++++++++++++++ 3 files changed, 35 inserti...
null
GHSA-3xjq-8j89-xrw9
Jenkins Badge Plugin cross-site scripting vulnerability
null
[ { "commit_message": "[PATCH] [SECURITY-906] pom.xml | 5 +++++ .../badge/action/BadgeSummaryAction.java | 18 +++++++++++++++++- .../plugins/badge/action/HtmlBadgeAction.java | 19 +++++++++++++++++-- .../badge/dsl/AddHtmlBadgeStepTest.java | 15 ++++++++++++++- ......
null
CVE-2023-42457
plone.rest vulnerable to Denial of Service when ++api++ is used many times
plone.rest allows users to use HTTP verbs such as GET, POST, PUT, DELETE, etc. in Plone. Starting in the 2.x branch and prior to versions 2.0.1 and 3.0.1, when the `++api++` traverser is accidentally used multiple times in a url, handling it takes increasingly longer, making the server less responsive. Patches are avai...
[ { "commit_message": "[PATCH] When ++api++ is in the url multiple times, redirect to the proper url. When the url is badly formed, for example `++api++/something/++api++`, give a 404 NotFound. Fixes a denial of service. news/1.bugfix | 5 +++++ src/plone/rest/tests/test_traversal.py | 30...
CWE-400: Uncontrolled Resource Consumption
GHSA-6w8h-26xx-cf8q
Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in org.xwiki.platform:xwiki-platform-menu-ui
null
[ { "commit_message": "[PATCH] XWIKI-19857: Modernize the menu macro and add escaping .../src/main/resources/Menu/MenuMacro.xml | 53 +++++++++++++------ 1 file changed, 38 insertions(+), 15 deletions(-)", "patch_text_b64": "RnJvbSAyZmMyMDg5MWU2YzZiMGNhMDVlZTA3ZTMxNWU3ZjQzNWU4OTE5ZjhkIE1vbiBTZXAgMTcgMDA6MD...
null
GHSA-fcm8-q275-jqv2
null
[ { "commit_message": "[PATCH] Truncate isolate_level to FRIBIDI_BIDI_MAX_EXPLICIT_LEVEL lib/fribidi-bidi.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAwMzRjNmU5YTFkMjk2Mjg2MzA1ZjRjZmQxZTAwNzJiODc5ZjUyNTY4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBEb3YgR3JvYmdlbGQgPGRvd...
null
GHSA-c92m-rrrc-q5wf
safemode gem allows context-dependent attackers to obtain sensitive information via the inspect method
null
[ { "commit_message": "[PATCH] Remove `inspect` from allowed methods The `inspect` method is pretty unsafe, as by default it includes a lot of data from the object. lib/safemode/blankslate.rb | 4 ++-- test/test_jail.rb | 4 ++-- 2 files changed, 4 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJ...
null
CVE-2021-23423
Directory Traversal
This affects the package bikeshed before 3.0.0. This can occur when an untrusted source file containing include, include-code or include-raw block is processed. The contents of arbitrary files could be disclosed in the HTML output.
[ { "commit_message": "[PATCH] Prevent escaping the source doc's folder, or running arbitrary code, without explicit opt-in at the command-line. bikeshed/InputSource.py | 19 +++++++++++++------ bikeshed/Spec.py | 2 +- bikeshed/cli.py | 14 ++++++++++++++ bikeshed/config/main...
Directory Traversal
GHSA-q6w2-89hq-hq27
keycloak Self Stored Cross-site Scripting vulnerability
null
[ { "commit_message": "[PATCH] KEYCLOAK-16890: Stored XSS attack on new acct console (#7867) .../ui/account2/PersonalInfoTest.java | 18 ++++++++++++++++++ .../account/resources/welcome-page-scripts.js | 8 +++++++- 2 files changed, 25 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA3MTdkOTU...
null
GHSA-xr3w-rmvj-f6m7
Mattermost has an Observable Timing Discrepancy vulnerability
null
[ { "commit_message": "[PATCH] MM-64755: Fix redirect in oauth login (#33388) (#33569) Automatic Merge server/channels/utils/utils.go | 15 ++- server/channels/utils/utils_test.go | 172 ++++++++++++++++++++++++++++ 2 files changed, 181 insertions(+), 6 deletions(-)", "patch_text_b64": "RnJvbSAzODIwOGI4Zj...
null
GHSA-54m3-95j9-v89j
Sentry improperly authorizes deletion of user issue alert notifications
null
[ { "commit_message": "[PATCH] fix(alerts): Prevent muting user alerts (#77093) ...er_notification_settings_options_detail.py | 26 +++++++++++++----- ...r_notification_settings_options_details.py | 27 ++++++++++++++++--- 2 files changed, 44 insertions(+), 9 deletions(-)", "patch_text_b64": "RnJvbSA1OTAyNTgyNT...
null
CVE-2019-14806
Pallets Werkzeug before 0.15.3, when used with Docker, has insufficient debugger PIN randomness because Docker containers share the same machine id.
[ { "commit_message": "[PATCH] unique debugger pin in Docker containers CHANGES.rst | 2 ++ src/werkzeug/debug/__init__.py | 13 +++++++++++++ 2 files changed, 15 insertions(+)", "patch_text_b64": "RnJvbSAwMGJjNDNiMTY3MmU2NjJlNWUzYjhjZWNkNzllNjdmYzk2OGZhMjQ2IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQ...
n/a
GHSA-wqr6-57qm-hhr5
Pimcore vulnerable to cross site scripting
null
[ { "commit_message": "[PATCH] Task: escape `path` column in Users > Workspaces .../public/js/pimcore/settings/user/workspace/asset.js | 1 + .../public/js/pimcore/settings/user/workspace/document.js | 3 ++- .../public/js/pimcore/settings/user/workspace/object.js | 1 + 3 files changed, 4 insert...
null
GHSA-rv95-4wxj-6fqq
Pylons Colander Denial of Service vulnerability
null
[ { "commit_message": "[PATCH 1/6] Update the URL validator regex colander/__init__.py | 24 +++++++++++++++++++----- 1 file changed, 19 insertions(+), 5 deletions(-)", "patch_text_b64": "RnJvbSBkNGY0Zjc3YTJjZmE1MTg0MjYxNzhiZDY5ZDJiMjlkZWU1N2Y3NzBkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBCZXJ0IEpXIFJlZ2VlciA...
null
CVE-2010-5328
include/linux/init_task.h in the Linux kernel before 2.6.35 does not prevent signals with a process group ID of zero from reaching the swapper process, which allows local users to cause a denial of service (system crash) by leveraging access to this process group.
[ { "commit_message": "[PATCH] INIT_TASK() should initialize ->thread_group list The trivial /sbin/init doing int main(void) { kill(0, SIGKILL) } crashes the kernel. This happens because __kill_pgrp_info(init_struct_pid) also sends SIGKILL to the swapper process which runs with the uninitialized ->thread_group. C...
n/a
GHSA-xr97-25v7-hc2q
UnoPim has Stored Cross-site Scripting vulnerability in user creation functionality
null
[ { "commit_message": "[PATCH] fix: add validation for file extension and mime - add missing 'file' key from request in ImportController - update user controller for test case .../Settings/DataTransfer/ImportController.php | 1 + .../src/Http/Controllers/Settings/UserController.php | 2 ++ .../JobInstances/...
null
CVE-2017-14241
Cross-site scripting (XSS) vulnerability in Dolibarr ERP/CRM 6.0.0 allows remote authenticated users to inject arbitrary web script or HTML via the Title parameter to htdocs/admin/menus/edit.php.
[ { "commit_message": "[PATCH] FIX Security fixes (filter onload js, less verbose error message in download and viewimage, show info to encourage dolibarr_main_prod=1) htdocs/admin/company.php | 216 +++++++++++++++--------------- htdocs/admin/menus/edit.php | 103 +++++++------- htdocs/core/lib/func...
n/a
CVE-2022-3019
Improper Access Control in tooljet/tooljet
The forgot password token basically just makes us capable of taking over the account of whoever comment in an app that we can see (bruteforcing comment id's might also be an option but I wouldn't count on it, since it would take a long time to find a valid one).
[ { "commit_message": "[PATCH] fix: hide user data from comments module server/src/entities/comment.entity.ts | 2 +- server/src/services/comment.service.ts | 44 +++++++++++++++----------- 2 files changed, 27 insertions(+), 19 deletions(-)", "patch_text_b64": "RnJvbSA0NWUwZDMzMDJkOTJkZjdkN2YyZDYwOWMzMWNlYTcx...
CWE-284 Improper Access Control