func_before
stringlengths
12
22.8k
func_after
stringlengths
11
24.7k
commit_msg
stringlengths
1
32.6k
commit_url
stringlengths
48
124
cve_id
stringclasses
530 values
cwe_id
stringclasses
134 values
file_name
stringlengths
4
244
vulnerability_score
int64
0
4
extension
stringclasses
6 values
is_test
bool
1 class
date
stringdate
1999-11-10 02:42:49
2024-01-29 16:00:57
function exportAsCSV(scope) { exportHTML = $("#exportButton").html() var csvScope = null var filename = campaign.name + ' - ' + capitalize(scope) + '.csv' switch (scope) { case "results": csvScope = campaign.results break; case "events": csvScope = cam...
function exportAsCSV(scope) { exportHTML = $("#exportButton").html() var csvScope = null var filename = campaign.name + ' - ' + capitalize(scope) + '.csv' switch (scope) { case "results": csvScope = campaign.results break; case "events": csvScope = cam...
Updated PapaParse config to prevent CSV injection. I've updated the PapaParse JS library to the latest version from the master branch which supports the `escapeForumlae` option in order to prevent malicious event entries from being parsed and executed by the Gophish user's spreadsheet software. When a new PapaParse r...
https://github.com/gophish/gophish/commit/b25f5ac5e468f6730e377f43c7995e18f8fccc2b
CVE-2020-24707
['CWE-1236']
static/js/src/app/campaign_results.js
4
js
false
2020-07-25T03:44:24Z
def _is_javascript_scheme(s): if _is_image_dataurl(s): return None return _is_possibly_malicious_scheme(s)
def _is_javascript_scheme(s): is_image_url = False for image_type in _find_image_dataurls(s): is_image_url = True if _is_unsafe_image_type(image_type): return True if is_image_url: return False return bool(_is_possibly_malicious_scheme(s))
Cleaner: Remove SVG image data URLs since they can embed script content. Reported as GHSL-2021-1038
https://github.com/lxml/lxml/commit/f2330237440df7e8f39c3ad1b1aa8852be3b27c0
null
null
src/lxml/html/clean.py
4
py
false
2021-11-11T12:21:08Z
function updateAdult(firstName, lastName, username, password, packNumber, leaderType, rankType, phoneNumber,adultID, connection) { var temp= selectAdult(username, connection); if(temp.databaseObject.adult_id<1) { temp= new Adult(firstName, lastName, username, packNumber, leaderType, rankType, phoneNumber,...
function updateAdult(firstName, lastName, username, password, packNumber, leaderType, rankType, phoneNumber,adultID, connection) { var temp= selectAdult(username, connection); if(temp.databaseObject.adult_id<1) { temp= new Adult(firstName, lastName, username, packNumber, leaderType, rankType, phoneNumber,...
Added protection from sql injection and dubug flag
https://github.com/Seiji42/cub-scout-tracker/commit/b4bc1a328b1f59437db159f9d136d9ed15707e31
CVE-2014-125046
['CWE-89']
databaseAccessFunctions.js
4
js
false
2014-12-10T02:29:24Z
static void vty_insert_word_overwrite (struct vty *vty, char *str) { int len = strlen (str); vty_write (vty, str, len); strcpy (&vty->buf[vty->cp], str); vty->cp += len; vty->length = vty->cp; }
static void vty_insert_word_overwrite (struct vty *vty, char *str) { size_t nwrite = MIN ((int) strlen (str), VTY_BUFSIZ - vty->cp); vty_write (vty, str, nwrite); strncpy (&vty->buf[vty->cp], str, nwrite); vty->cp += nwrite; vty->length = vty->cp; }
lib: limit size of vty buffer to 4096 bytes This removes the automatic resizing of the vty input buffer and places a hard size cap of 4096 bytes. It also fixes a potentially unsafe strcpy. Signed-off-by: Quentin Young <qlyoung@cumulusnetworks.com>
https://github.com/freerangerouting/frr/commit/2af38873d89e20bd039255418366c1601aa99e64
null
null
lib/vty.c
4
c
false
2017-01-10T23:33:50Z
async function respond(request, options, manifest, state) { /** URL but stripped from the potential `/__data.json` suffix and its search param */ let url = new URL(request.url); if (options.csrf_check_origin) { const forbidden = request.method === 'POST' && request.headers.get('origin') !== url.origin && ...
async function respond(request, options, manifest, state) { /** URL but stripped from the potential `/__data.json` suffix and its search param */ let url = new URL(request.url); if (options.csrf_check_origin) { const forbidden = is_form_content_type(request) && (request.method === 'POST' || request.met...
Merge pull request from GHSA-5p75-vc5g-8rv2 * fix: address security advisory CVE-2023-29003 by enabling CSRF protection for plain/text requests * Protect PUT/PATCH/DELETE. Add comment explicitly mentioning CSRF * update docs * update changeset * Update packages/kit/types/index.d.ts Co-authored-by: Conduitry <git@...
https://github.com/sveltejs/kit/commit/bb2253d51d00aba2e4353952d4fb0dcde6c77123
CVE-2023-29003
['CWE-184', 'CWE-352']
packages/kit/src/runtime/server/respond.js
4
js
false
2023-04-04T17:42:00Z
public static Cache.StoredCommentLinkInfoProto serialize(StoredCommentLinkInfo autoValue) { return Cache.StoredCommentLinkInfoProto.newBuilder() .setName(autoValue.getName()) .setMatch(nullToEmpty(autoValue.getMatch())) .setLink(nullToEmpty(autoValue.getLink())) .setPrefix(nullToEmpt...
public static Cache.StoredCommentLinkInfoProto serialize(StoredCommentLinkInfo autoValue) { return Cache.StoredCommentLinkInfoProto.newBuilder() .setName(autoValue.getName()) .setMatch(nullToEmpty(autoValue.getMatch())) .setLink(nullToEmpty(autoValue.getLink())) .setPrefix(nullToEmpt...
Remove html commentlink functionality. Html commentlinks are too powerful and often allow for arbitrary html injection on the page. Instead they are replaced with link commentlinks, using optional `prefix`, `suffix`, `text` parameters to achieve the same functionality. The commentlinks that do not generate a link, bu...
https://github.com/GerritCodeReview/gerrit/commit/734db9aedd22993a098e972ce5b4bc4b729f4638
null
null
java/com/google/gerrit/server/cache/serialize/entities/StoredCommentLinkInfoSerializer.java
4
java
false
2022-11-11T10:19:25Z
function Gr(e,t,n){var r=e.display,i=e.doc,o=document.createDocumentFragment(),a=Gn(e.display),s=a.left,l=Math.max(r.sizerWidth,Yn(e)-r.sizer.offsetLeft)-a.right,u="ltr"==i.direction;function c(e,t,n,r){t<0&&(t=0),t=Math.round(t),r=Math.round(r),o.appendChild(O("div",null,"CodeMirror-selected","position: absolute; left...
function Gr(e,t,n){var r=e.display,i=e.doc,o=document.createDocumentFragment(),a=Gn(e.display),s=a.left,l=Math.max(r.sizerWidth,Zn(e)-r.sizer.offsetLeft)-a.right,c="ltr"==i.direction;function u(e,t,n,r){t<0&&(t=0),t=Math.round(t),r=Math.round(r),o.appendChild(O("div",null,"CodeMirror-selected","position: absolute; left...
fix: OPTIC-179: Properly ensure content is escaped (#4926) * fix: OPTIC-179: Properly ensure content is escaped * ci: Build frontend Workflow run: https://github.com/HumanSignal/label-studio/actions/runs/6567480699 * update types * ci: Build frontend Workflow run: https://github.com/HumanSignal/label-st...
https://github.com/HumanSignal/label-studio/commit/a7a71e594f32ec4af8f3f800d5ccb8662e275da3
CVE-2023-47115
['CWE-79']
label_studio/frontend/dist/react-app/index.js
4
js
false
2023-10-19T01:22:32Z
struct vfsmount *clone_private_mount(const struct path *path) { struct mount *old_mnt = real_mount(path->mnt); struct mount *new_mnt; if (IS_MNT_UNBINDABLE(old_mnt)) return ERR_PTR(-EINVAL); new_mnt = clone_mnt(old_mnt, path->dentry, CL_PRIVATE); if (IS_ERR(new_mnt)) return ERR_CAST(new_mnt); /* Longterm m...
struct vfsmount *clone_private_mount(const struct path *path) { struct mount *old_mnt = real_mount(path->mnt); struct mount *new_mnt; down_read(&namespace_sem); if (IS_MNT_UNBINDABLE(old_mnt)) goto invalid; if (!check_mnt(old_mnt)) goto invalid; if (has_locked_children(old_mnt, path->dentry)) goto invali...
ovl: prevent private clone if bind mount is not allowed Add the following checks from __do_loopback() to clone_private_mount() as well: - verify that the mount is in the current namespace - verify that there are no locked children Reported-by: Alois Wohlschlager <alois1@gmx-topmail.de> Fixes: c771d683a62e ("vfs: ...
https://github.com/torvalds/linux/commit/427215d85e8d1476da1a86b8d67aceb485eb3631
null
null
fs/namespace.c
4
c
false
2021-08-09T08:19:47Z
private static String encode(String password) { return new MessageDigestPasswordEncoder("MD5", true).encodePassword(password, null); }
private static String encode(String password) { return MD5PasswordEncoder.getEncodedPassword(password); }
Added Support for JDK 16+ - various dependencies updated to avoid illegal access exceptions - Spring core libraries updated to version 5.3.6 (was 4.3.40) - Jackson updated to 2.11.3 (was 2.6.1) - Spring security updated to 5.4.6 (was 4.2.20) - MD5 password encoder provided (MD5 is no longer available out of the b...
https://github.com/UniTime/unitime/commit/226836050b7941fe1a1d0fdfe17ccaf1071d82e1
null
null
JavaSource/org/unitime/timetable/server/PasswordChangeBackend.java
4
java
false
2021-05-11T07:40:48Z
static int __net_init sit_init_net(struct net *net) { struct sit_net *sitn = net_generic(net, sit_net_id); struct ip_tunnel *t; int err; sitn->tunnels[0] = sitn->tunnels_wc; sitn->tunnels[1] = sitn->tunnels_l; sitn->tunnels[2] = sitn->tunnels_r; sitn->tunnels[3] = sitn->tunnels_r_l; if (!net_has_fallback_tunn...
static int __net_init sit_init_net(struct net *net) { struct sit_net *sitn = net_generic(net, sit_net_id); struct ip_tunnel *t; int err; sitn->tunnels[0] = sitn->tunnels_wc; sitn->tunnels[1] = sitn->tunnels_l; sitn->tunnels[2] = sitn->tunnels_r; sitn->tunnels[3] = sitn->tunnels_r_l; if (!net_has_fallback_tunn...
net: sit: fix memory leak in sit_init_net() If register_netdev() is failed to register sitn->fb_tunnel_dev, it will go to err_reg_dev and forget to free netdev(sitn->fb_tunnel_dev). BUG: memory leak unreferenced object 0xffff888378daad00 (size 512): comm "syz-executor.1", pid 4006, jiffies 4295121142 (age 16.115s) ...
https://github.com/torvalds/linux/commit/07f12b26e21ab359261bf75cfcb424fdc7daeb6d
null
null
net/ipv6/sit.c
4
c
false
2019-03-01T15:06:40Z
static void control_work_handler(struct work_struct *work) { struct ports_device *portdev; struct virtqueue *vq; struct port_buffer *buf; unsigned int len; portdev = container_of(work, struct ports_device, control_work); vq = portdev->c_ivq; spin_lock(&portdev->c_ivq_lock); while ((buf = virtqueue_get_buf(vq,...
static void control_work_handler(struct work_struct *work) { struct ports_device *portdev; struct virtqueue *vq; struct port_buffer *buf; unsigned int len; portdev = container_of(work, struct ports_device, control_work); vq = portdev->c_ivq; spin_lock(&portdev->c_ivq_lock); while ((buf = virtqueue_get_buf(vq,...
virtio_console: Assure used length from device is limited The buf->len might come from an untrusted device. This ensures the value would not exceed the size of the buffer to avoid data corruption or loss. Signed-off-by: Xie Yongji <xieyongji@bytedance.com> Acked-by: Jason Wang <jasowang@redhat.com> Link: https://lore...
https://github.com/torvalds/linux/commit/d00d8da5869a2608e97cfede094dfc5e11462a46
null
null
drivers/char/virtio_console.c
4
c
false
2021-05-25T12:56:22Z
void ff_h264_free_tables(H264Context *h, int free_rbsp) { int i; H264Context *hx; av_freep(&h->intra4x4_pred_mode); av_freep(&h->chroma_pred_mode_table); av_freep(&h->cbp_table); av_freep(&h->mvd_table[0]); av_freep(&h->mvd_table[1]); av_freep(&h->direct_table); av_freep(&h->non_zer...
void ff_h264_free_tables(H264Context *h, int free_rbsp) { int i; H264Context *hx; av_freep(&h->intra4x4_pred_mode); av_freep(&h->chroma_pred_mode_table); av_freep(&h->cbp_table); av_freep(&h->mvd_table[0]); av_freep(&h->mvd_table[1]); av_freep(&h->direct_table); av_freep(&h->non_zer...
avcodec/h264: Clear delayed_pic on deallocation Fixes use of freed memory Fixes: case5_av_frame_copy_props.mp4 Found-by: Michal Zalewski <lcamtuf@coredump.cx> Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
https://github.com/FFmpeg/FFmpeg/commit/e8714f6f93d1a32f4e4655209960afcf4c185214
null
null
libavcodec/h264.c
4
c
false
2014-12-17T20:27:37Z
@Override public int hashCode() { return Objects.hash(match, link, html, enabled); }
@Override public int hashCode() { return Objects.hash(match, link, prefix, suffix, text, enabled); }
Remove html commentlink functionality. Html commentlinks are too powerful and often allow for arbitrary html injection on the page. Instead they are replaced with link commentlinks, using optional `prefix`, `suffix`, `text` parameters to achieve the same functionality. The commentlinks that do not generate a link, bu...
https://github.com/GerritCodeReview/gerrit/commit/734db9aedd22993a098e972ce5b4bc4b729f4638
null
null
java/com/google/gerrit/extensions/api/projects/CommentLinkInfo.java
4
java
false
2022-11-11T10:19:25Z
gboolean flatpak_builtin_remote_info (int argc, char **argv, GCancellable *cancellable, GError **error) { g_autoptr(GOptionContext) context = NULL; g_autoptr(GPtrArray) dirs = NULL; g_autoptr(FlatpakDir) preferred_dir = NULL; g_autoptr(GVariant) commit_v = NULL; const char *remote; const char *pref; g_aut...
gboolean flatpak_builtin_remote_info (int argc, char **argv, GCancellable *cancellable, GError **error) { g_autoptr(GOptionContext) context = NULL; g_autoptr(GPtrArray) dirs = NULL; g_autoptr(FlatpakDir) preferred_dir = NULL; g_autoptr(GVariant) commit_v = NULL; const char *remote; const char *pref; g_aut...
Ensure special characters in permissions and metadata are escaped This prevents someone from placing special characters in order to manipulate the appearance of the permissions list. CVE-2023-28101, GHSA-h43h-fwqx-mpp8 Signed-off-by: Ryan Gonzalez <ryan.gonzalez@collabora.com>
https://github.com/flatpak/flatpak/commit/6cac99dafe6003c8a4bd5666341c217876536869
null
null
app/flatpak-builtins-remote-info.c
4
c
false
2023-03-04T22:23:37Z
function isUrl(string){ return matcher.test(string); }
function isUrl(string){ var match = string.match(protocolAndDomainRE); if (!match) { return false; } var everythingAfterProtocol = match[1]; if (!everythingAfterProtocol) { return false; } if (localhostDomainRE.test(everythingAfterProtocol) || nonLocalhostDomainRE.test(everythingAfterProto...
security: Fix REDOS vulnerability Problem: As disclosed by email, the regex in this module was vulnerable to catastrophic backtracking. This could be used as a REDOS vector for Node.js servers that use this module. Solution: Use a two-step validation process. Split the vulnerable regex into three safe ones.
https://github.com/segmentio/is-url/commit/149550935c63a98c11f27f694a7c4a9479e53794
CVE-2018-25079
['CWE-1333']
index.js
4
js
false
2018-03-19T21:07:17Z
static void ax25_kill_by_device(struct net_device *dev) { ax25_dev *ax25_dev; ax25_cb *s; if ((ax25_dev = ax25_dev_ax25dev(dev)) == NULL) return; spin_lock_bh(&ax25_list_lock); again: ax25_for_each(s, &ax25_list) { if (s->ax25_dev == ax25_dev) { spin_unlock_bh(&ax25_list_lock); lock_sock(s->sk); s->...
static void ax25_kill_by_device(struct net_device *dev) { ax25_dev *ax25_dev; ax25_cb *s; struct sock *sk; if ((ax25_dev = ax25_dev_ax25dev(dev)) == NULL) return; spin_lock_bh(&ax25_list_lock); again: ax25_for_each(s, &ax25_list) { if (s->ax25_dev == ax25_dev) { sk = s->sk; sock_hold(sk); spin_unlo...
ax25: improve the incomplete fix to avoid UAF and NPD bugs The previous commit 1ade48d0c27d ("ax25: NPD bug when detaching AX25 device") introduce lock_sock() into ax25_kill_by_device to prevent NPD bug. But the concurrency NPD or UAF bug will occur, when lock_sock() or release_sock() dereferences the ax25_cb->sock. ...
https://github.com/torvalds/linux/commit/4e0f718daf97d47cf7dec122da1be970f145c809
null
null
net/ax25/af_ax25.c
4
c
false
2022-01-28T04:47:15Z
def main(): global logger result = 0 parser = argparse.ArgumentParser(description='Keycloak REST client', prog=prog_name, epilog=verbose_help.format(prog_name=prog_name), formatter_class=argparse.RawDescriptionHelpFormatter) parser.add_argume...
def main(): global logger result = 0 parser = argparse.ArgumentParser(description='Keycloak REST client', prog=prog_name, epilog=verbose_help.format(prog_name=prog_name), formatter_class=argparse.RawDescriptionHelpFormatter) parser.add_argume...
CVE-2017-15111 unsafe /tmp log file in --log-file option in keycloak_cli.py keycloak_cli.py is essentially a set of utilities used by the keycloak-httpd-client-install tool. It can be invoked on it's own, mostly for testing or to execute just one part of the Keycloak REST API. It's log file defaulted to /tmp/{prog_nam...
https://github.com/jdennis/keycloak-httpd-client-install/commit/07f26e213196936fb328ea0c1d5a66a09d8b5440
null
null
keycloak_httpd_client/keycloak_cli.py
4
py
false
2018-01-08T23:53:14Z
[HttpGet("{storeId}/tokens/{tokenId}/revoke")] public async Task<IActionResult> RevokeToken(string tokenId) { var token = await _TokenRepository.GetToken(tokenId); if (token == null || token.StoreId != CurrentStore.Id) return NotFound(); return View("C...
[HttpGet("{storeId}/tokens/{tokenId}/revoke")] public async Task<IActionResult> RevokeToken(string tokenId) { var token = await _TokenRepository.GetToken(tokenId); if (token == null || token.StoreId != CurrentStore.Id) return NotFound(); return View("C...
Fix several HTML injections
https://github.com/btcpayserver/btcpayserver/commit/02070d65836cd24627929b3403efbae8de56039a
null
null
BTCPayServer/Controllers/UIStoresController.cs
4
cs
false
2023-01-21T10:05:41Z
[HttpGet("{itemId}/stream")] [HttpHead("{itemId}/stream", Name = "HeadVideoStream")] [ProducesResponseType(StatusCodes.Status200OK)] [ProducesVideoFile] public async Task<ActionResult> GetVideoStream( [FromRoute, Required] Guid itemId, [FromQuery] string? containe...
[HttpGet("{itemId}/stream")] [HttpHead("{itemId}/stream", Name = "HeadVideoStream")] [ProducesResponseType(StatusCodes.Status200OK)] [ProducesVideoFile] public async Task<ActionResult> GetVideoStream( [FromRoute, Required] Guid itemId, [FromQuery][RegularExpressio...
Merge pull request from GHSA-866x-wj5j-2vf4 Validate codec and container
https://github.com/jellyfin/jellyfin/commit/a656799dc879d16d21bf2ce7ad412ebd5d45394a
null
null
Jellyfin.Api/Controllers/VideosController.cs
4
cs
false
2023-11-29T03:20:32Z
static void create_vterm(term_T *term, int rows, int cols) { VTerm *vterm; VTermScreen *screen; VTermState *state; VTermValue value; vterm = vterm_new_with_allocator(rows, cols, &vterm_allocator, NULL); term->tl_vterm = vterm; screen = vterm_obtain_screen(vterm); vterm_s...
static int create_vterm(term_T *term, int rows, int cols) { VTerm *vterm; VTermScreen *screen; VTermState *state; VTermValue value; vterm = vterm_new_with_allocator(rows, cols, &vterm_allocator, NULL); term->tl_vterm = vterm; if (vterm == NULL) return FAIL; // Allocate...
patch 8.1.0633: crash when out of memory while opening a terminal window Problem: Crash when out of memory while opening a terminal window. Solution: Handle out-of-memory more gracefully.
https://github.com/vim/vim/commit/cd929f7ba8cc5b6d6dcf35c8b34124e969fed6b8
null
null
src/terminal.c
4
c
false
2018-12-24T20:38:45Z
static int create_qp_common(struct mlx5_ib_dev *dev, struct ib_pd *pd, struct ib_qp_init_attr *init_attr, struct ib_udata *udata, struct mlx5_ib_qp *qp) { struct mlx5_ib_resources *devr = &dev->devr; int inlen = MLX5_ST_SZ_BYTES(create_qp_in); struct mlx5_core_dev *mdev = dev->mdev; struct mlx5_ib_cre...
static int create_qp_common(struct mlx5_ib_dev *dev, struct ib_pd *pd, struct ib_qp_init_attr *init_attr, struct ib_udata *udata, struct mlx5_ib_qp *qp) { struct mlx5_ib_resources *devr = &dev->devr; int inlen = MLX5_ST_SZ_BYTES(create_qp_in); struct mlx5_core_dev *mdev = dev->mdev; struct mlx5_ib_cre...
IB/mlx5: Fix leaking stack memory to userspace mlx5_ib_create_qp_resp was never initialized and only the first 4 bytes were written. Fixes: 41d902cb7c32 ("RDMA/mlx5: Fix definition of mlx5_ib_create_qp_resp") Cc: <stable@vger.kernel.org> Acked-by: Leon Romanovsky <leonro@mellanox.com> Signed-off-by: Jason Gunthorpe <...
https://github.com/torvalds/linux/commit/0625b4ba1a5d4703c7fb01c497bd6c156908af00
null
null
drivers/infiniband/hw/mlx5/qp.c
4
c
false
2018-08-14T21:33:52Z
private void loadCommentLinkSections(Config rc) { Set<String> subsections = rc.getSubsections(COMMENTLINK); commentLinkSections = new LinkedHashMap<>(subsections.size()); for (String name : subsections) { try { commentLinkSections.put(name, buildCommentLink(rc, name, false)); } catch (Pa...
private void loadCommentLinkSections(Config rc) { Set<String> subsections = rc.getSubsections(COMMENTLINK); commentLinkSections = new LinkedHashMap<>(subsections.size()); for (String name : subsections) { try { commentLinkSections.put(name, buildCommentLink(rc, name)); } catch (PatternSy...
Remove html commentlink functionality. Html commentlinks are too powerful and often allow for arbitrary html injection on the page. Instead they are replaced with link commentlinks, using optional `prefix`, `suffix`, `text` parameters to achieve the same functionality. The commentlinks that do not generate a link, bu...
https://github.com/GerritCodeReview/gerrit/commit/734db9aedd22993a098e972ce5b4bc4b729f4638
null
null
java/com/google/gerrit/server/project/ProjectConfig.java
4
java
false
2022-11-11T10:19:25Z
static void hid_input_field(struct hid_device *hid, struct hid_field *field, __u8 *data, int interrupt) { unsigned n; unsigned count = field->report_count; unsigned offset = field->report_offset; unsigned size = field->report_size; __s32 min = field->logical_minimum; __s32 max = field->logical_maximum; __...
static void hid_input_field(struct hid_device *hid, struct hid_field *field, __u8 *data, int interrupt) { unsigned n; unsigned count = field->report_count; unsigned offset = field->report_offset; unsigned size = field->report_size; __s32 min = field->logical_minimum; __s32 max = field->logical_maximum; __...
HID: core: prevent out-of-bound readings Plugging a Logitech DJ receiver with KASAN activated raises a bunch of out-of-bound readings. The fields are allocated up to MAX_USAGE, meaning that potentially, we do not have enough fields to fit the incoming values. Add checks and silence KASAN. Signed-off-by: Benjamin Tis...
https://github.com/torvalds/linux/commit/50220dead1650609206efe91f0cc116132d59b3f
null
null
drivers/hid/hid-core.c
4
c
false
2016-01-19T11:34:58Z
int ping_recvmsg(struct kiocb *iocb, struct sock *sk, struct msghdr *msg, size_t len, int noblock, int flags, int *addr_len) { struct inet_sock *isk = inet_sk(sk); int family = sk->sk_family; struct sk_buff *skb; int copied, err; pr_debug("ping_recvmsg(sk=%p,sk->num=%u)\n", isk, isk->inet_num); err = -EOPNOT...
int ping_recvmsg(struct kiocb *iocb, struct sock *sk, struct msghdr *msg, size_t len, int noblock, int flags, int *addr_len) { struct inet_sock *isk = inet_sk(sk); int family = sk->sk_family; struct sk_buff *skb; int copied, err; pr_debug("ping_recvmsg(sk=%p,sk->num=%u)\n", isk, isk->inet_num); err = -EOPNOT...
ping: prevent NULL pointer dereference on write to msg_name A plain read() on a socket does set msg->msg_name to NULL. So check for NULL pointer first. Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org> Signed-off-by: David S. Miller <davem@davemloft.net>
https://github.com/torvalds/linux/commit/cf970c002d270c36202bd5b9c2804d3097a52da0
null
null
net/ipv4/ping.c
4
c
false
2013-11-18T06:07:45Z
function ho(t){var e=t.match(uo);if(e){var n={};return e.forEach((function(t){n[t.slice(1)]=!0})),n}}
function ho(t){return t==t&&!zs(t)}
Merge pull request #10171 from snipe/fixes/xss_svg_in_file_uploads Fixed SVG XSS vuln
https://github.com/snipe/snipe-it/commit/fc5efd857f61f7e45c61db567bb66612bcb53128
CVE-2021-3863
['CWE-79']
public/js/build/app.js
4
js
false
2021-10-06T19:38:51Z
public void checkIfNotificationAllowed() { if (!NotificationUtils.canShowNotifications(getContext())) { if (buttonNotifAlertEnabled.isSelected()) { buttonNotifAlertEnabled.setSelected(false); buttonNotifAlertDisabled.setSelected(true); ...
public void checkIfNotificationAllowed() { if (!NotificationUtils.canShowNotifications(getContext())) { persistentButtonGroup.selectButton(WeatherPreferences.DISABLED); alertsButtonGroup.selectButton(WeatherPreferences.DISABLED); } }
2.2.4 * Added Gadgetbridge support * Added predictive back gesture for Android 13 * Bugfix: Additional crashes in settings
https://github.com/TylerWilliamson/QuickWeather/commit/b50ae0bbe94c0bed822c34c6cdafc53424926cf0
null
null
app/src/main/java/com/ominous/quickweather/activity/SettingsActivity.java
4
java
false
2022-10-05T23:40:18Z
int nfs3svc_decode_writeargs(struct svc_rqst *rqstp, __be32 *p, struct nfsd3_writeargs *args) { unsigned int len, v, hdr, dlen; u32 max_blocksize = svc_max_payload(rqstp); struct kvec *head = rqstp->rq_arg.head; struct kvec *tail = rqstp->rq_arg.tail; p = decode_fh(p, &args->fh); if (!p) return 0; p = xd...
int nfs3svc_decode_writeargs(struct svc_rqst *rqstp, __be32 *p, struct nfsd3_writeargs *args) { unsigned int len, v, hdr, dlen; u32 max_blocksize = svc_max_payload(rqstp); struct kvec *head = rqstp->rq_arg.head; struct kvec *tail = rqstp->rq_arg.tail; p = decode_fh(p, &args->fh); if (!p) return 0; p = xd...
nfsd: stricter decoding of write-like NFSv2/v3 ops The NFSv2/v3 code does not systematically check whether we decode past the end of the buffer. This generally appears to be harmless, but there are a few places where we do arithmetic on the pointers involved and don't account for the possibility that a length could b...
https://github.com/torvalds/linux/commit/13bf9fbff0e5e099e2b6f003a0ab8ae145436309
null
null
fs/nfsd/nfs3xdr.c
4
c
false
2017-04-21T19:26:30Z
function l(e){e=!e?{}:e.internal?e:Object.create(e);e.internal=true;if(e.value){e.content=e.value}e.outputHeight=1;e.scrollable=e.hasVScrollBar=e.hasHScrollBar=e.extraScrolling=false;e.scrollX=e.scrollY=0;e.lineWrap=true;this.onAutoCompleteMenuSubmit=this.onAutoCompleteMenuSubmit.bind(this);this.onAutoCompleteMenuCance...
function l(e){if(s===clearTimeout){return clearTimeout(e)}if((s===a||!s)&&clearTimeout){s=clearTimeout;return clearTimeout(e)}try{return s(e)}catch(t){try{return s.call(null,e)}catch(t){return s.call(this,e)}}}
Fix a possible ReDoS
https://github.com/cronvel/terminal-kit/commit/a2e446cc3927b559d0281683feb9b821e83b758c
CVE-2021-4306
['CWE-1333']
browser/termkit.min.js
4
js
false
2021-10-12T09:55:03Z
static int __ip6_datagram_connect(struct sock *sk, struct sockaddr *uaddr, int addr_len) { struct sockaddr_in6 *usin = (struct sockaddr_in6 *) uaddr; struct inet_sock *inet = inet_sk(sk); struct ipv6_pinfo *np = inet6_sk(sk); struct in6_addr *daddr, *final_p, final; struct dst_entry *dst; struct flowi6 fl6; str...
static int __ip6_datagram_connect(struct sock *sk, struct sockaddr *uaddr, int addr_len) { struct sockaddr_in6 *usin = (struct sockaddr_in6 *) uaddr; struct inet_sock *inet = inet_sk(sk); struct ipv6_pinfo *np = inet6_sk(sk); struct in6_addr *daddr, *final_p, final; struct dst_entry *dst; struct flowi6 fl6; str...
ipv6: add complete rcu protection around np->opt This patch addresses multiple problems : UDP/RAW sendmsg() need to get a stable struct ipv6_txoptions while socket is not locked : Other threads can change np->opt concurrently. Dmitry posted a syzkaller (http://github.com/google/syzkaller) program desmonstrating use-a...
https://github.com/torvalds/linux/commit/45f6fad84cc305103b28d73482b344d7f5b76f39
null
null
net/ipv6/datagram.c
4
c
false
2015-11-30T03:37:57Z
function parse(source,defaultNSMapCopy,entityMap,domBuilder,errorHandler){ function fixedFromCharCode(code) { // String.prototype.fromCharCode does not supports // > 2 bytes unicode chars directly if (code > 0xffff) { code -= 0x10000; var surrogate1 = 0xd800 + (code >> 10) , surrogate2 = 0xdc00 + (code...
function parse(source,defaultNSMapCopy,entityMap,domBuilder,errorHandler){ function fixedFromCharCode(code) { // String.prototype.fromCharCode does not supports // > 2 bytes unicode chars directly if (code > 0xffff) { code -= 0x10000; var surrogate1 = 0xd800 + (code >> 10) , surrogate2 = 0xdc00 + (code...
Merge pull request from GHSA-h6q6-9hqw-rwfv * fix!: Preserve quotes in DOCTYPE declaration Since the only purpose of parsing the DOCTYPE is to be able to restore it when serializing, we decided that it would be best to leave the parsed publicId and systemId as is, including any quotes. BREAKING CHANGE: If somebody r...
https://github.com/xmldom/xmldom/commit/d4201b9dfbf760049f457f9f08a3888d48835135
CVE-2021-21366
['CWE-115', 'CWE-436']
lib/sax.js
4
js
false
2021-03-09T03:21:56Z
static void php_zip_get_from(INTERNAL_FUNCTION_PARAMETERS, int type) /* {{{ */ { struct zip *intern; zval *self = getThis(); struct zip_stat sb; struct zip_file *zf; zend_long index = -1; zend_long flags = 0; zend_long len = 0; zend_string *filename; zend_string *buffer; int n = 0; if (!self) { RETURN...
static void php_zip_get_from(INTERNAL_FUNCTION_PARAMETERS, int type) /* {{{ */ { struct zip *intern; zval *self = getThis(); struct zip_stat sb; struct zip_file *zf; zend_long index = -1; zend_long flags = 0; zend_long len = 0; zend_string *filename; zend_string *buffer; int n = 0; if (!self) { RETURN...
Fix bug #71923 - integer overflow in ZipArchive::getFrom*
https://github.com/php/php-src/commit/3b8d4de300854b3517c7acb239b84f7726c1353c
null
null
ext/zip/php_zip.c
4
c
false
2016-04-20T06:49:22Z
def get_groups(self, env, token): """Get groups for the given token. :param env: The current WSGI environment dictionary. :param token: Token to validate and return a group string for. :returns: None if the token is invalid or a string containing a comma separated lis...
def get_groups(self, env, token): """Get groups for the given token. :param env: The current WSGI environment dictionary. :param token: Token to validate and return a group string for. :returns: None if the token is invalid or a string containing a comma separated lis...
Hash token before storing it in Swift Swauth uses token value as object name. Object names are logged in proxy and object servers. Anybody with access to proxy/object server logs can see token values. Attacker can use this token to access user's data in Swift store. Instead of token, hashed token (with HASH_PATH_PREFI...
https://github.com/openstack/swauth/commit/70af7986265a3defea054c46efc82d0698917298
null
null
swauth/middleware.py
4
py
false
2017-11-21T08:38:09Z
static int ivr_read_header(AVFormatContext *s) { unsigned tag, type, len, tlen, value; int i, j, n, count, nb_streams = 0, ret; uint8_t key[256], val[256]; AVIOContext *pb = s->pb; AVStream *st; int64_t pos, offset, temp; pos = avio_tell(pb); tag = avio_rl32(pb); if (tag == MKTAG('....
static int ivr_read_header(AVFormatContext *s) { unsigned tag, type, len, tlen, value; int i, j, n, count, nb_streams = 0, ret; uint8_t key[256], val[256]; AVIOContext *pb = s->pb; AVStream *st; int64_t pos, offset, temp; pos = avio_tell(pb); tag = avio_rl32(pb); if (tag == MKTAG('....
avformat/rmdec: Fix DoS due to lack of eof check Fixes: loop.ivr Found-by: Xiaohei and Wangchu from Alibaba Security Team Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
https://github.com/FFmpeg/FFmpeg/commit/124eb202e70678539544f6268efc98131f19fa49
null
null
libavformat/rmdec.c
4
c
false
2017-08-24T23:15:28Z
def validate_uploaded_file_for_valid_image(f): if f is None: return None from PIL import Image # We need to get a file object for Pillow. We might have a path or we might # have to read the data into memory. if hasattr(f, 'temporary_file_path'): file = f.temporary_file_path() e...
def validate_uploaded_file_for_valid_image(f): if f is None: return None from PIL import Image # We need to get a file object for Pillow. We might have a path or we might # have to read the data into memory. if hasattr(f, 'temporary_file_path'): file = f.temporary_file_path() e...
[SECURITY] Do not allow Pillow to parse EPS files
https://github.com/pretix/pretix/commit/8583bfb7d97263e9e923ad5d7f123ca1cadc8f2e
null
null
src/pretix/helpers/images.py
4
py
false
2023-09-11T16:57:08Z
@Override boolean verify(char[] guess) throws InvalidKeyException { try { return Arrays.equals(digest, digestOf(algorithm, salt, guess)); } catch (NoSuchAlgorithmException e) { throw log.invalidKeyNoSuchMessageDigestAlgorithm(algorithm); } }
@Override boolean verify(char[] guess) throws InvalidKeyException { try { return MessageDigest.isEqual(digest, digestOf(algorithm, salt, guess)); } catch (NoSuchAlgorithmException e) { throw log.invalidKeyNoSuchMessageDigestAlgorithm(algorithm); } }
ELY-2422 Update SaltedSimpleDigestPasswordImpl to make use of MessageDigest#isEqual to avoid a potential timing attack
https://github.com/wildfly-security/wildfly-elytron/commit/3d353e9ae542994e9408f05ae3ee0c4ea8996a87
null
null
password/impl/src/main/java/org/wildfly/security/password/impl/SaltedSimpleDigestPasswordImpl.java
4
java
false
2022-09-16T21:33:03Z
function c(){for(var e=[],t=0;t<arguments.length;t++){var n=arguments[t];if(n){var o=typeof n;if("string"==o||"number"==o)e.push(n);else if(Array.isArray(n)&&n.length){var r=c.apply(null,n);r&&e.push(r)}else if("object"==o)for(var i in n)a.call(n,i)&&n[i]&&e.push(i)}}return e.join(" ")}
function c(){var t=this;!function(e,t){if(!(e instanceof t))throw new TypeError("Cannot call a class as a function")}(this,c),this.inputFocused=!1,this.editorMouseDown=!1,this.onEditorMouseDown=function(){t.editorFocused=!0},this.onInputMouseDown=function(){t.inputFocused=!0},this.isEditorBlur=function(e){return"INPUT"...
Releasing security update
https://github.com/jpuri/react-draft-wysiwyg/commit/d2faeb612b53f10dff048de7dc57e1f4044b5380
CVE-2021-31712
['CWE-79']
dist/react-draft-wysiwyg.js
4
js
false
2021-04-17T12:27:12Z
static int __ipmi_bmc_register(struct ipmi_smi *intf, struct ipmi_device_id *id, bool guid_set, guid_t *guid, int intf_num) { int rv; struct bmc_device *bmc; struct bmc_device *old_bmc; /* * platform_device_register() can cause bmc_reg_mutex to * be claimed because of the is_v...
static int __ipmi_bmc_register(struct ipmi_smi *intf, struct ipmi_device_id *id, bool guid_set, guid_t *guid, int intf_num) { int rv; struct bmc_device *bmc; struct bmc_device *old_bmc; /* * platform_device_register() can cause bmc_reg_mutex to * be claimed because of the is_v...
ipmi: Fix memory leak in __ipmi_bmc_register In the impelementation of __ipmi_bmc_register() the allocated memory for bmc should be released in case ida_simple_get() fails. Fixes: 68e7e50f195f ("ipmi: Don't use BMC product/dev ids in the BMC name") Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com> Message-Id...
https://github.com/torvalds/linux/commit/4aa7afb0ee20a97fbf0c5bab3df028d5fb85fdab
null
null
drivers/char/ipmi/ipmi_msghandler.c
4
c
false
2019-10-21T20:06:48Z
function copy(val, key) { var obj = this[key]; if (isObject(val) && isObject(obj)) { mixinDeep(obj, val); } else { this[key] = val; } }
function copy(val, key) { if (key === '__proto__') { return; } var obj = this[key]; if (isObject(val) && isObject(obj)) { mixinDeep(obj, val); } else { this[key] = val; } }
exclude __proto__
https://github.com/jonschlinkert/mixin-deep/commit/578b0bc5e74e14de9ef4975f504dc698796bdf9c
CVE-2018-3719
['CWE-20', 'CWE-471']
index.js
4
js
false
2018-02-07T16:04:06Z
RLEEXTRA if ((rowDelta == 0) || (rowDelta < width)) return FALSE; if (!pbSrcBuffer || !pbDestBuffer) return FALSE; pbEnd = pbSrcBuffer + cbSrcBuffer; pbDestEnd = pbDestBuffer + rowDelta * height; while (pbSrc < pbEnd) { /* Watch out for the end of the first scanline. */ if (fFirstLine) { if ((UIN...
RLEEXTRA if ((rowDelta == 0) || (rowDelta < width)) return FALSE; if (!pbSrcBuffer || !pbDestBuffer) return FALSE; pbEnd = pbSrcBuffer + cbSrcBuffer; pbDestEnd = pbDestBuffer + rowDelta * height; while (pbSrc < pbEnd) { /* Watch out for the end of the first scanline. */ if (fFirstLine) { if ((UIN...
Fixed out of bound read in RLEDECOMPRESS CVE-2020-4033 thanks to @antonio-morales for finding this.
https://github.com/FreeRDP/FreeRDP/commit/0a98c450c58ec150e44781c89aa6f8e7e0f571f5
null
null
libfreerdp/codec/include/bitmap.c
4
c
false
2020-06-02T06:45:09Z
static int aac_send_raw_srb(struct aac_dev* dev, void __user * arg) { struct fib* srbfib; int status; struct aac_srb *srbcmd = NULL; struct user_aac_srb *user_srbcmd = NULL; struct user_aac_srb __user *user_srb = arg; struct aac_srb_reply __user *user_reply; struct aac_srb_reply* reply; u32 fibsize = 0; u32 fl...
static int aac_send_raw_srb(struct aac_dev* dev, void __user * arg) { struct fib* srbfib; int status; struct aac_srb *srbcmd = NULL; struct user_aac_srb *user_srbcmd = NULL; struct user_aac_srb __user *user_srb = arg; struct aac_srb_reply __user *user_reply; struct aac_srb_reply* reply; u32 fibsize = 0; u32 fl...
aacraid: prevent invalid pointer dereference It appears that driver runs into a problem here if fibsize is too small because we allocate user_srbcmd with fibsize size only but later we access it until user_srbcmd->sg.count to copy it over to srbcmd. It is not correct to test (fibsize < sizeof(*user_srbcmd)) because t...
https://github.com/torvalds/linux/commit/b4789b8e6be3151a955ade74872822f30e8cd914
null
null
drivers/scsi/aacraid/commctrl.c
4
c
false
2013-10-31T08:31:02Z
static krb5_error_code get_matching_data(krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context req_cryptoctx, X509 *cert, pkinit_cert_matching_data **md_out) { krb5_error_code ret = ENOMEM; pkinit_cert_matching_data *md = N...
static krb5_error_code get_matching_data(krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context req_cryptoctx, X509 *cert, pkinit_cert_matching_data **md_out) { krb5_error_code ret = ENOMEM; pkinit_cert_matching_data *md = N...
Fix PKINIT cert matching data construction Rewrite X509_NAME_oneline_ex() and its call sites to use dynamic allocation and to perform proper error checking. ticket: 8617 target_version: 1.16 target_version: 1.15-next target_version: 1.14-next tags: pullup
https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4
null
null
src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
4
c
false
2017-10-17T22:50:15Z
@Override public void getField(int index, String key) { C.luaJ_getfield(L, index, key); }
@Override public void getField(int index, String key) { checkStack(1); C.luaJ_getfield(L, index, key); }
Fixed Lua stack overflow: causing memory corruption
https://github.com/gudzpoz/luajava/commit/83505ac0aaba37ed1b6434677bd4fd681b391926
null
null
luajava/src/main/java/party/iroiro/luajava/AbstractLua.java
4
java
false
2022-06-27T15:20:47Z
def _inject_metadata_into_fs(metadata, fs, execute=None): metadata_path = os.path.join(fs, "meta.js") metadata = dict([(m.key, m.value) for m in metadata]) utils.execute('tee', metadata_path, process_input=jsonutils.dumps(metadata), run_as_root=True)
def _inject_metadata_into_fs(metadata, fs, execute=None): metadata = dict([(m.key, m.value) for m in metadata]) _inject_file_into_fs(fs, 'meta.js', jsonutils.dumps(metadata))
Prevent file injection writing to host filesystem. Fix bug 1015531, CVE-2012-3360, CVE-2012-3361 This patch prevents the file injection code from writing into the host filesystem if a user specifies a path for the injected file that contains '..'. The check is to make sure that the final normalized path that is abou...
https://github.com/openstack/nova/commit/2427d4a99bed35baefd8f17ba422cb7aae8dcca7
null
null
nova/virt/disk/api.py
4
py
false
2012-06-20T15:13:13Z
function v(t,e){var n="undefined"!=typeof Symbol&&t[Symbol.iterator]||t["@@iterator"];if(!n){if(Array.isArray(t)||(n=function(t,e){if(t){if("string"==typeof t)return p(t,e);var n=Object.prototype.toString.call(t).slice(8,-1);return"Object"===n&&t.constructor&&(n=t.constructor.name),"Map"===n||"Set"===n?Array.from(t):"A...
function v(t,e){(null==e||e>t.length)&&(e=t.length);for(var n=0,i=new Array(e);n<e;n++)i[n]=t[n];return i}
Merge pull request #341 from SimplyBinary/fix-inner-html Fix innerHTML XSS vulnerability
https://github.com/quill-mention/quill-mention/commit/e85262ddced0a7f0b6fc8350d236a68bd1e28385
CVE-2023-26149
['CWE-79']
docs/quill.mention.min.js
4
js
false
2023-09-11T13:18:36Z
static int rawsock_create(struct net *net, struct socket *sock, const struct nfc_protocol *nfc_proto, int kern) { struct sock *sk; pr_debug("sock=%p\n", sock); if ((sock->type != SOCK_SEQPACKET) && (sock->type != SOCK_RAW)) return -ESOCKTNOSUPPORT; if (sock->type == SOCK_RAW) sock->ops = &rawsock_raw_op...
static int rawsock_create(struct net *net, struct socket *sock, const struct nfc_protocol *nfc_proto, int kern) { struct sock *sk; pr_debug("sock=%p\n", sock); if ((sock->type != SOCK_SEQPACKET) && (sock->type != SOCK_RAW)) return -ESOCKTNOSUPPORT; if (sock->type == SOCK_RAW) { if (!capable(CAP_NET_RAW)...
net/nfc/rawsock.c: add CAP_NET_RAW check. When creating a raw AF_NFC socket, CAP_NET_RAW needs to be checked first. Signed-off-by: Qingyu Li <ieatmuttonchuan@gmail.com> Signed-off-by: David S. Miller <davem@davemloft.net>
https://github.com/torvalds/linux/commit/26896f01467a28651f7a536143fe5ac8449d4041
null
null
net/nfc/rawsock.c
4
c
false
2020-08-10T01:51:00Z
def get_vault_token(vault_endpoint: str, vault_secret: str) -> str: if not vault_endpoint: raise ValueError('vault_endpoint is required') if not vault_secret: raise ValueError('vault_secret is required') headers = {'X-Vault-Token': vault_secret} response = requests.get(vault_endpoint, h...
def get_vault_token(vault_endpoint: str, vault_secret: str, vault_endpoint_verify: str | bool | None = True) -> str: if not vault_endpoint: raise ValueError('vault_endpoint is required') if not vault_secret: raise ValueError('vault_secret is required') headers = {'X-Vault-Token': vault_secr...
Enabled TLS certificate verification in get_vault_token()
https://github.com/allegro/bigflow/commit/7e956661f76907594e8c82e8fb0af76dbea2a0fc
null
null
bigflow/deploy.py
4
py
false
2023-01-30T11:23:56Z
void bn_set_2b(bn_t a, int b) { int i, d; if (b < 0) { bn_zero(a); } else { RLC_RIP(b, d, b); bn_grow(a, d + 1); for (i = 0; i < d; i++) { a->dp[i] = 0; } a->used = d + 1; a->dp[d] = ((dig_t)1 << b); a->sign = RLC_POS; } }
void bn_set_2b(bn_t a, size_t b) { int i, d; if (b >= RLC_BN_SIZE * RLC_DIG) { RLC_THROW(ERR_NO_VALID); } else { RLC_RIP(b, d, b); bn_grow(a, d + 1); for (i = 0; i < d; i++) { a->dp[i] = 0; } a->used = d + 1; a->dp[d] = ((dig_t)1 << b); a->sign = RLC_POS; } }
Huge commit improving the API to use size_t instead of int.
https://github.com/relic-toolkit/relic/commit/34580d840469361ba9b5f001361cad659687b9ab
null
null
src/bn/relic_bn_util.c
4
c
false
2022-11-14T20:47:12Z
function escapeArgForQuoted(arg) { return arg .replace(/[\0\u0008\u001B\u009B]/gu, "") .replace(/\r?\n|\r/gu, " ") .replace(/"/gu, `""`); }
function escapeArgForQuoted(arg) { return arg .replace(/[\0\u0008\u001B\u009B]/gu, "") .replace(/\r?\n|\r/gu, " ") .replace(/%/gu, "^%") .replace(/"/gu, `""`); }
Test coverage for environment variables (#982) Add e2e test coverage for environment variables and add escaping of `%` for CMD. ALso include `%` in test fixtures for all shells on Windows. The new test cases for environment variables are also included in the `shescape/testing` injectionStrings.
https://github.com/ericcornelissen/shescape/commit/d0fce70f987ac0d8331f93cb45d47e79436173ac
CVE-2023-35931
['CWE-526']
src/win/cmd.js
4
js
false
2023-06-21T18:31:29Z
function I(t,e,n,r){var i,o,a,s,u,l,c,f=e&&e.ownerDocument,p=e?e.nodeType:9;if(n=n||[],"string"!=typeof t||!t||1!==p&&9!==p&&11!==p)return n;if(!r&&(V(e),e=e||T,C)){if(11!==p&&(u=L.exec(t)))if(i=u[1]){if(9===p){if(!(a=e.getElementById(i)))return n;if(a.id===i)return k.call(n,a),n}else if(f&&(a=f.getElementById(i))&&I.c...
function I(t,e,n,r){var i,o,a,s,u,l,c,f=e&&e.ownerDocument,p=e?e.nodeType:9;if(n=n||[],"string"!=typeof t||!t||1!==p&&9!==p&&11!==p)return n;if(!r&&(V(e),e=e||T,C)){if(11!==p&&(u=L.exec(t)))if(i=u[1]){if(9===p){if(!(a=e.getElementById(i)))return n;if(a.id===i)return k.call(n,a),n}else if(f&&(a=f.getElementById(i))&&I.c...
Fixed xss in admin panel, complete fix SSRF in upload by link, option for store via html filter, jQuery v3.7.1, update Toastr.
https://github.com/instantsoft/icms2/commit/d0aeeaf5979fbdbf80dc3a3227d6c58442ab7487
CVE-2023-4878
['CWE-918']
templates/modern/js/jquery.js
4
js
false
2023-09-10T17:46:58Z
static void nsc_encode_argb_to_aycocg(NSC_CONTEXT* context, const BYTE* data, UINT32 scanline) { UINT16 x; UINT16 y; UINT16 rw; BYTE ccl; const BYTE* src; BYTE* yplane = NULL; BYTE* coplane = NULL; BYTE* cgplane = NULL; BYTE* aplane = NULL; INT16 r_val; INT16 g_val; INT...
static BOOL nsc_encode_argb_to_aycocg(NSC_CONTEXT* context, const BYTE* data, UINT32 scanline) { UINT16 x; UINT16 y; UINT16 rw; BYTE ccl; const BYTE* src; BYTE* yplane = NULL; BYTE* coplane = NULL; BYTE* cgplane = NULL; BYTE* aplane = NULL; INT16 r_val; INT16 g_val; INT...
Fixed CVE-2018-8788 Thanks to Eyal Itkin from Check Point Software Technologies.
https://github.com/FreeRDP/FreeRDP/commit/d1112c279bd1a327e8e4d0b5f371458bf2579659
null
null
libfreerdp/codec/nsc_encode.c
4
c
false
2018-10-22T14:52:21Z
static __always_inline ssize_t __mcopy_atomic(struct mm_struct *dst_mm, unsigned long dst_start, unsigned long src_start, unsigned long len, bool zeropage, bool *mmap_changing) { struct vm_area_struct *dst_vma; ssize_t err; pmd_t *dst_pmd; unsigned long src_add...
static __always_inline ssize_t __mcopy_atomic(struct mm_struct *dst_mm, unsigned long dst_start, unsigned long src_start, unsigned long len, bool zeropage, bool *mmap_changing) { struct vm_area_struct *dst_vma; ssize_t err; pmd_t *dst_pmd; unsigned long src_add...
userfaultfd: shmem/hugetlbfs: only allow to register VM_MAYWRITE vmas After the VMA to register the uffd onto is found, check that it has VM_MAYWRITE set before allowing registration. This way we inherit all common code checks before allowing to fill file holes in shmem and hugetlbfs with UFFDIO_COPY. The userfaultf...
https://github.com/torvalds/linux/commit/29ec90660d68bbdd69507c1c8b4e33aa299278b1
null
null
mm/userfaultfd.c
4
c
false
2018-11-30T22:09:32Z
@Override boolean verify(final char[] guess) throws InvalidKeyException { byte[] guessAsBytes = getNormalizedPasswordBytes(guess); byte[] test; try { test = encode(guessAsBytes, getSalt()); } catch (NoSuchAlgorithmException e) { throw log.invalidKeyCannotVerif...
@Override boolean verify(final char[] guess) throws InvalidKeyException { byte[] guessAsBytes = getNormalizedPasswordBytes(guess); byte[] test; try { test = encode(guessAsBytes, getSalt()); } catch (NoSuchAlgorithmException e) { throw log.invalidKeyCannotVerif...
ELY-2426: Update UnixMD5CryptPassworldImpl to make use of MessageDigest#isEqual to avoid a potential timing attack
https://github.com/wildfly-security/wildfly-elytron/commit/4abb472f61e91ff1c3a731b1b5f22925efb3d22b
null
null
password/impl/src/main/java/org/wildfly/security/password/impl/UnixMD5CryptPasswordImpl.java
4
java
false
2022-09-16T20:17:04Z
void ion_free(struct ion_client *client, struct ion_handle *handle) { bool valid_handle; BUG_ON(client != handle->client); mutex_lock(&client->lock); valid_handle = ion_handle_validate(client, handle); if (!valid_handle) { WARN(1, "%s: invalid handle passed to free.\n", __func__); mutex_unlock(&client->lock...
void ion_free(struct ion_client *client, struct ion_handle *handle) { BUG_ON(client != handle->client); mutex_lock(&client->lock); ion_free_nolock(client, handle); mutex_unlock(&client->lock); }
staging/android/ion : fix a race condition in the ion driver There is a use-after-free problem in the ion driver. This is caused by a race condition in the ion_ioctl() function. A handle has ref count of 1 and two tasks on different cpus calls ION_IOC_FREE simultaneously. cpu 0 cpu ...
https://github.com/torvalds/linux/commit/9590232bb4f4cc824f3425a6e1349afbe6d6d2b7
null
null
drivers/staging/android/ion/ion.c
4
c
false
2016-02-24T04:38:06Z
static int mode_encrypt(File filein, File fileout) { size_t bytesread; size_t chunkbuflen; void *chunkbuf = NULL; void *ivbuf = NULL; size_t encryptbuflen = 0; size_t encryptedlen = 0; void *encryptbuf = NULL; ulonglong ttlchunkswritten = 0; ulonglong ttlbyteswritten = 0; xb_wcrypt_t *xbcrypt...
static int mode_encrypt(File filein, File fileout) { size_t bytesread; size_t chunkbuflen; uchar *chunkbuf = NULL; void *ivbuf = NULL; size_t encryptbuflen = 0; size_t encryptedlen = 0; void *encryptbuf = NULL; ulonglong ttlchunkswritten = 0; ulonglong ttlbyteswritten = 0; xb_wcrypt_t *xbcryp...
Merge branch '2.3-xb-pxb-186' into 2.4-xb-pxb-186 * 2.3-xb-pxb-186: CVE-2016-6225: xtrabackup encryption is not setting the IV correctly
https://github.com/percona/percona-xtrabackup/commit/c043893ad7bd21d2c70e5528e27aa8674ff6b8e0
null
null
storage/innobase/xtrabackup/src/xbcrypt.c
4
c
false
2016-11-22T13:49:59Z
function Compiler(node, options) { this.options = options = options || {}; this.node = node; this.bufferedConcatenationCount = 0; this.hasCompiledDoctype = false; this.hasCompiledTag = false; this.pp = options.pretty || false; if (this.pp && typeof this.pp !== 'string') { this.pp = ' '; } this.de...
function Compiler(node, options) { this.options = options = options || {}; this.node = node; this.bufferedConcatenationCount = 0; this.hasCompiledDoctype = false; this.hasCompiledTag = false; this.pp = options.pretty || false; if (this.pp && typeof this.pp !== 'string') { this.pp = ' '; } if (thi...
fix: sanitise and escape the `pretty` option (#3314)
https://github.com/pugjs/pug/commit/991e78f7c4220b2f8da042877c6f0ef5a4683be0
CVE-2021-21353
['CWE-74']
packages/pug-code-gen/index.js
4
js
false
2021-02-28T18:21:18Z
void h2o_configurator__init_core(h2o_globalconf_t *conf) { /* check if already initialized */ if (h2o_configurator_get_command(conf, "files") != NULL) return; { /* `hosts` and `paths` */ h2o_configurator_t *c = h2o_configurator_create(conf, sizeof(*c)); h2o_configurator_define_comma...
void h2o_configurator__init_core(h2o_globalconf_t *conf) { /* check if already initialized */ if (h2o_configurator_get_command(conf, "files") != NULL) return; { /* `hosts` and `paths` */ h2o_configurator_t *c = h2o_configurator_create(conf, sizeof(*c)); h2o_configurator_define_comma...
[http2] delay processing requests upon observing suspicious behavior
https://github.com/h2o/h2o/commit/94fbc54b6c9309912fe3d53e7b63408bbe9a1b0d
null
null
lib/core/configurator.c
4
c
false
2023-10-10T05:56:41Z
static void channel_on_sending(belle_sip_channel_listener_t *obj, belle_sip_channel_t *chan, belle_sip_message_t *msg){ belle_sip_header_address_t* contact; belle_sip_header_content_length_t* content_length = (belle_sip_header_content_length_t*)belle_sip_message_get_header(msg,"Content-Length"); const belle_sip_list...
static void channel_on_sending(belle_sip_channel_listener_t *obj, belle_sip_channel_t *chan, belle_sip_message_t *msg){ belle_sip_header_address_t* contact; belle_sip_header_content_length_t* content_length = (belle_sip_header_content_length_t*)belle_sip_message_get_header(msg,"Content-Length"); const belle_sip_list...
-fix via header of CANCEL request -fix crash in case of malformed paramless request uri in From header -fix crash in case of From header display name with last value set to « \ »
https://github.com/BelledonneCommunications/belle-sip/commit/d3f0651531e45e91c2e60f3a16a8b612802e5d2d
null
null
src/provider.c
4
c
false
2021-09-07T15:15:25Z
public String[] getWebpages() { return webpages; }
public String[] getWebpages() { return webpages != null ? webpages.clone() : null; }
Fix the vulnerability for public methods that return private array Signed-off-by: yugeeklab <yugeeklab@gmail.com>
https://github.com/fosslight/fosslight/commit/f95687a2685772c164f53209549ef932806f764f
null
null
src/main/java/oss/fosslight/domain/LicenseMaster.java
4
java
false
2021-11-25T06:27:31Z
static void l2tp_bearer_cap_print(netdissect_options *ndo, const u_char *dat) { const uint32_t *ptr = (const uint32_t *)dat; if (EXTRACT_32BITS(ptr) & L2TP_BEARER_CAP_ANALOG_MASK) { ND_PRINT((ndo, "A")); } if (EXTRACT_32BITS(ptr) & L2TP_BEARER_CAP_DIGITAL_MASK) { ND_PRINT((ndo, "D")); } }
static void l2tp_bearer_cap_print(netdissect_options *ndo, const u_char *dat, u_int length) { const uint32_t *ptr = (const uint32_t *)dat; if (length < 4) { ND_PRINT((ndo, "AVP too short")); return; } if (EXTRACT_32BITS(ptr) & L2TP_BEARER_CAP_ANALOG_MASK) { ND_PRINT((ndo, "A")); } if (EXTRACT_32BITS(ptr) ...
CVE-2017-13006/L2TP: Check whether an AVP's content exceeds the AVP length. It's not good enough to check whether all the data specified by the AVP length was captured - you also have to check whether that length is large enough for all the required data in the AVP. This fixes a buffer over-read discovered by Yannick...
https://github.com/the-tcpdump-group/tcpdump/commit/cc4a7391c616be7a64ed65742ef9ed3f106eb165
null
null
print-l2tp.c
4
c
false
2017-03-06T03:56:20Z
static int asepcos_parse_sec_attr(sc_card_t *card, sc_file_t *file, const u8 *buf, size_t len) { const u8 *p = buf; while (len != 0) { unsigned int amode, tlen = 3; if (len < 5 && p[0] != 0x80 && p[1] != 0x01) { sc_debug(card->ctx, SC_LOG_DEBUG_NORMAL, "invalid access mode encoding"); return SC_ERROR_INTE...
static int asepcos_parse_sec_attr(sc_card_t *card, sc_file_t *file, const u8 *buf, size_t len) { const u8 *p = buf; while (len != 0) { unsigned int amode, tlen = 3; if (len < 5 || p[0] != 0x80 || p[1] != 0x01) { sc_debug(card->ctx, SC_LOG_DEBUG_NORMAL, "invalid access mode encoding"); return SC_ERROR_INTE...
fixed out of bounds reads Thanks to Eric Sesterhenn from X41 D-SEC GmbH for reporting and suggesting security fixes.
https://github.com/OpenSC/OpenSC/commit/8fe377e93b4b56060e5bbfb6f3142ceaeca744fa
null
null
src/libopensc/card-asepcos.c
4
c
false
2018-05-25T12:54:47Z
public CommentLinkInfo toInfo() { CommentLinkInfo info = new CommentLinkInfo(); info.name = getName(); info.match = getMatch(); info.link = getLink(); info.prefix = getPrefix(); info.suffix = getSuffix(); info.text = getText(); info.html = getHtml(); info.enabled = getEnabled(); ...
public CommentLinkInfo toInfo() { CommentLinkInfo info = new CommentLinkInfo(); info.name = getName(); info.match = getMatch(); info.link = getLink(); info.prefix = getPrefix(); info.suffix = getSuffix(); info.text = getText(); info.enabled = getEnabled(); return info; }
Remove html commentlink functionality. Html commentlinks are too powerful and often allow for arbitrary html injection on the page. Instead they are replaced with link commentlinks, using optional `prefix`, `suffix`, `text` parameters to achieve the same functionality. The commentlinks that do not generate a link, bu...
https://github.com/GerritCodeReview/gerrit/commit/734db9aedd22993a098e972ce5b4bc4b729f4638
null
null
java/com/google/gerrit/entities/StoredCommentLinkInfo.java
4
java
false
2022-11-11T10:19:25Z
int fscrypt_get_encryption_info(struct inode *inode) { struct fscrypt_info *ci = inode->i_crypt_info; if (!ci || (ci->ci_keyring_key && (ci->ci_keyring_key->flags & ((1 << KEY_FLAG_INVALIDATED) | (1 << KEY_FLAG_REVOKED) | (1 << KEY_FLAG_DEAD))))) return fscrypt_get_crypt_info(inode); ...
int fscrypt_get_encryption_info(struct inode *inode) { struct fscrypt_info *crypt_info; struct fscrypt_context ctx; struct crypto_skcipher *ctfm; const char *cipher_str; int keysize; u8 *raw_key = NULL; int res; if (inode->i_crypt_info) return 0; res = fscrypt_initialize(inode->i_sb->s_cop->flags); if (re...
fscrypt: remove broken support for detecting keyring key revocation Filesystem encryption ostensibly supported revoking a keyring key that had been used to "unlock" encrypted files, causing those files to become "locked" again. This was, however, buggy for several reasons, the most severe of which was that when key r...
https://github.com/torvalds/linux/commit/1b53cf9815bb4744958d41f3795d5d5a1d365e2d
null
null
fs/crypto/keyinfo.c
4
c
false
2017-02-21T23:07:11Z
private boolean isVulnerableLog4j2(Version v) { // according to 2021-12-22 update // Upgrade to Log4j 2.12.3 for Java 7 if (v.getMajor() == 2 && v.getMinor() == 12 && v.getPatch() >= 3) return false; // Upgrade to Log4j 2.3.1 for Java 6 if (v.getMajor() == 2 && v.getMinor() == 3 && v.getPatch() >= 1) r...
private boolean isVulnerableLog4j2(Version v) { // according to 2021-12-29 CVE-2021-44832 update // Upgrade to Log4j 2.12.4 for Java 7 if (v.getMajor() == 2 && v.getMinor() == 12 && v.getPatch() >= 4) return false; // Upgrade to Log4j 2.3.2 for Java 6 if (v.getMajor() == 2 && v.getMinor() == 3 && v.getPat...
Detect also CVE-2021-44832 (log4j 2.17.0) vulnerability. v2.6.4
https://github.com/logpresso/CVE-2021-44228-Scanner/commit/12500cd7c73455f3b0944f73c23e23b0b8b42c69
null
null
src/main/java/com/logpresso/scanner/Detector.java
4
java
false
2021-12-29T01:38:38Z
public static File[] convertPdf2Png(File inputPdfFile) throws IOException { if (PDFBOX.equals(System.getProperty(PDF_LIBRARY))) { return PdfBoxUtilities.convertPdf2Png(inputPdfFile); } else { try { return PdfGsUtilities.convertPdf2Png(inputPdfFile); } ...
public static File[] convertPdf2Png(File inputPdfFile) throws IOException { return PdfBoxUtilities.convertPdf2Png(inputPdfFile); }
Remove ghost4j dependency due to log4j vulnerabilities
https://github.com/nguyenq/tess4j/commit/9cfb5a04f92a391b126368c27a1e55d2ea280b41
null
null
src/main/java/net/sourceforge/tess4j/util/PdfUtilities.java
4
java
false
2022-02-22T16:40:59Z
static void headerMergeLegacySigs(Header h, Header sigh) { HeaderIterator hi; struct rpmtd_s td; hi = headerInitIterator(sigh); for (; headerNext(hi, &td); rpmtdFreeData(&td)) { switch (td.tag) { /* XXX Translate legacy signature tag values. */ case RPMSIGTAG_SIZE: td.tag = RPMTAG_SIGSIZE; ...
static rpmTagVal headerMergeLegacySigs(Header h, Header sigh, char **msg) { const struct taglate_s *xl; struct rpmtd_s td; rpmtdReset(&td); for (xl = xlateTags; xl->stag; xl++) { /* There mustn't be one in the main header */ if (headerIsEntry(h, xl->xtag)) break; if (headerGet(sigh, xl->stag, &...
Be much more careful about copying data from the signature header Only look for known tags, and ensure correct type and size where known before copying over. Bump the old arbitrary 16k count limit to 16M limit though, it's not inconceivable that a package could have that many files. While at it, ensure none of these t...
https://github.com/rpm-software-management/rpm/commit/d6a86b5e69e46cc283b1e06c92343319beb42e21
null
null
lib/package.c
4
c
false
2021-03-04T11:21:19Z
static int open_cred_file(char *file_name, struct parsed_mount_info *parsed_info) { char *line_buf = NULL; char *temp_val = NULL; FILE *fs = NULL; int i; const int line_buf_size = 4096; const int min_non_white = 10; i = toggle_dac_capability(0, 1); if (i) goto return_i; i = access(file_name, R_OK); if ...
static int open_cred_file(char *file_name, struct parsed_mount_info *parsed_info) { char *line_buf = NULL; char *temp_val = NULL; FILE *fs = NULL; int i; const int line_buf_size = 4096; const int min_non_white = 10; i = toggle_dac_capability(0, 1); if (i) goto return_i; i = access(file_name, R_OK); if ...
mount.cifs: fix verbose messages on option parsing When verbose logging is enabled, invalid credentials file lines may be dumped to stderr. This may lead to information disclosure in particular conditions when the credentials file given is sensitive and contains '=' signs. Bug: https://bugzilla.samba.org/show_bug.cgi...
https://github.com/piastry/cifs-utils/commit/3d67d09b4a73c85ac34c739a6936c456e80be038
null
null
mount.cifs.c
4
c
false
null
static int multipart_process_part_header(modsec_rec *msr, char **error_msg) { int i, len, rc; if (error_msg == NULL) return -1; *error_msg = NULL; /* Check for nul bytes. */ len = MULTIPART_BUF_SIZE - msr->mpd->bufleft; for(i = 0; i < len; i++) { if (msr->mpd->buf[i] == '\0') { ...
static int multipart_process_part_header(modsec_rec *msr, char **error_msg) { int i, len, rc; if (error_msg == NULL) return -1; *error_msg = NULL; /* Check for nul bytes. */ len = MULTIPART_BUF_SIZE - msr->mpd->bufleft; for(i = 0; i < len; i++) { if (msr->mpd->buf[i] == '\0') { ...
Multipart parsing fixes and new MULTIPART_PART_HEADERS collection
https://github.com/SpiderLabs/ModSecurity/commit/7a489bd07c66d3df19a320b4306e00c49716dbb0
null
null
apache2/msc_multipart.c
4
c
false
2022-09-07T18:09:47Z
def _clone( cls, git: "Git", url: PathLike, path: PathLike, odb_default_type: Type[GitCmdObjectDB], progress: Union["RemoteProgress", "UpdateProgress", Callable[..., "RemoteProgress"], None] = None, multi_options: Optional[List[str]] = None, allow_unsafe_p...
def _clone( cls, git: "Git", url: PathLike, path: PathLike, odb_default_type: Type[GitCmdObjectDB], progress: Union["RemoteProgress", "UpdateProgress", Callable[..., "RemoteProgress"], None] = None, multi_options: Optional[List[str]] = None, allow_unsafe_p...
Block insecure non-multi options in clone/clone_from Follow-up to #1521
https://github.com/gitpython-developers/GitPython/commit/5c59e0d63da6180db8a0b349f0ad36fef42aceed
null
null
git/repo/base.py
4
py
false
2023-07-10T14:10:10Z
void svhandler_flash_pgm_blk(void) { uint32_t beginAddr = _param_1; uint32_t data = _param_2; uint32_t length = _param_3; // Protect from overflow. if (beginAddr + length < beginAddr) return; // Do not allow firmware to erase bootstrap or bootloader sectors. if (((beginAddr >= BSTRP_FLASH_SECT_START) &&...
void svhandler_flash_pgm_blk(void) { uint32_t beginAddr = _param_1; uint32_t data = _param_2; uint32_t length = _param_3; // Verify requested address range is allowed. if (!allow_svhandler_flash_range(beginAddr, beginAddr + length)) return; // Unlock flash. flash_clear_status_flags(); flash_unlock(); ...
fix: more robust address range checks in svhandler_flash_*
https://github.com/keepkey/keepkey-firmware/commit/447c1f038a31378ab9589965c098467d9ea6cccc
null
null
lib/board/supervise.c
4
c
false
2022-04-12T19:44:55Z
static int parse_packet (sockent_t *se, /* {{{ */ void *buffer, size_t buffer_size, int flags, const char *username) { int status; value_list_t vl = VALUE_LIST_INIT; notification_t n; #if HAVE_LIBGCRYPT int packet_was_signed = (flags & PP_SIGNED); int packet_was_encrypted = (flags & PP_ENCRYPTED); in...
static int parse_packet (sockent_t *se, /* {{{ */ void *buffer, size_t buffer_size, int flags, const char *username) { int status; value_list_t vl = VALUE_LIST_INIT; notification_t n; #if HAVE_LIBGCRYPT int packet_was_signed = (flags & PP_SIGNED); int packet_was_encrypted = (flags & PP_ENCRYPTED); in...
network plugin: Fix heap overflow in parse_packet(). Emilien Gaspar has identified a heap overflow in parse_packet(), the function used by the network plugin to parse incoming network packets. This is a vulnerability in collectd, though the scope is not clear at this point. At the very least specially crafted network...
https://github.com/collectd/collectd/commit/b589096f907052b3a4da2b9ccc9b0e2e888dfc18
null
null
src/network.c
4
c
false
2016-07-19T08:00:37Z
static long do_get_mempolicy(int *policy, nodemask_t *nmask, unsigned long addr, unsigned long flags) { int err; struct mm_struct *mm = current->mm; struct vm_area_struct *vma = NULL; struct mempolicy *pol = current->mempolicy; if (flags & ~(unsigned long)(MPOL_F_NODE|MPOL_F_ADDR|MPOL_F_MEMS_ALLOWED)) ...
static long do_get_mempolicy(int *policy, nodemask_t *nmask, unsigned long addr, unsigned long flags) { int err; struct mm_struct *mm = current->mm; struct vm_area_struct *vma = NULL; struct mempolicy *pol = current->mempolicy; if (flags & ~(unsigned long)(MPOL_F_NODE|MPOL_F_ADDR|MPOL_F_MEMS_ALLOWED)) ...
mm/mempolicy: fix use after free when calling get_mempolicy I hit a use after free issue when executing trinity and repoduced it with KASAN enabled. The related call trace is as follows. BUG: KASan: use after free in SyS_get_mempolicy+0x3c8/0x960 at addr ffff8801f582d766 Read of size 2 by task syz-executor1/798 ...
https://github.com/torvalds/linux/commit/73223e4e2e3867ebf033a5a8eb2e5df0158ccc99
null
null
mm/mempolicy.c
4
c
false
2017-08-18T22:16:24Z
set(value) { if (typeof(value) !== 'function') { currentPrepareStackTrace = value; return; } const wrapped = localReflectApply(localWeakMapGet, wrappedPrepareStackTrace, [value]); if (wrapped) { currentPrepareStackTrace = wrapped; return; } const newWrapped = (error, sst) => { if (...
set(value) { if (typeof(value) !== 'function') { currentPrepareStackTrace = value; return; } const wrapped = localReflectApply(localWeakMapGet, wrappedPrepareStackTrace, [value]); if (wrapped) { currentPrepareStackTrace = wrapped; return; } const newWrapped = (error, sst) => { if (...
Fix security issue
https://github.com/patriksimek/vm2/commit/3a9876482be487b78a90ac459675da7f83f46d69
CVE-2022-25893
['NVD-CWE-noinfo']
lib/setup-sandbox.js
4
js
false
2022-07-05T12:26:06Z
public String[] getIds() { return ids; }
public String[] getIds() { return ids != null ? ids.clone() : null; }
Fix the vulnerability for public method that return private type Change public method that return private type to public method that return copy. Signed-off-by: yugeeklab <yugeeklab@gmail.com>
https://github.com/fosslight/fosslight/commit/7c1222e56b2b08a64551162bb579eb431f4e9798
null
null
src/main/java/oss/fosslight/domain/ComBean.java
4
java
false
2021-11-17T01:54:51Z
function Ya(){$e=$e.concat(lr.takeRecords()),$e.length&&!Rt&&(Rt=!0,queueMicrotask(()=>{Za(),Rt=!1}))}
function Ya(){fr(Fe),Fe.length=0}
Stop caching csrf token in case of using wire:navigate across different sessions
https://github.com/livewire/livewire/commit/5d887316f2aaf83c0e380ac5e72766f19700fa3b
CVE-2024-22859
['CWE-352']
dist/livewire.min.js
4
js
false
2023-09-12T19:49:03Z
void shutdown_mib(void) { unload_all_mibs(); if (tree_top) { if (tree_top->label) SNMP_FREE(tree_top->label); SNMP_FREE(tree_top); } tree_head = NULL; Mib = NULL; if (_mibindexes) { int i; for (i = 0; i < _mibindex; ++i) SNMP_FREE(_mibindex...
void shutdown_mib(void) { unload_all_mibs(); if (tree_top) { if (tree_top->label) SNMP_FREE(tree_top->label); SNMP_FREE(tree_top); } tree_head = NULL; Mib = NULL; if (Prefix != NULL && Prefix != &Standard_Prefix[0]) SNMP_FREE(Prefix); if (Prefix) P...
CHANGES: snmpd: Stop reading and writing the mib_indexes/* files Caching directory contents is something the operating system should do and is not something Net-SNMP should do. Instead of storing a copy of the directory contents in ${tmp_dir}/mib_indexes/${n}, always scan a MIB directory.
https://github.com/net-snmp/net-snmp/commit/4fd9a450444a434a993bc72f7c3486ccce41f602
null
null
snmplib/mib.c
4
c
false
2019-05-22T07:56:21Z
static int DefragDoSturgesNovakTest(int policy, u_char *expected, size_t expected_len) { int i; int ret = 0; DefragInit(); /* * Build the packets. */ int id = 1; Packet *packets[17]; memset(packets, 0x00, sizeof(packets)); /* * Original fragments. */ /* A*24 ...
static int DefragDoSturgesNovakTest(int policy, u_char *expected, size_t expected_len) { int i; int ret = 0; DefragInit(); /* * Build the packets. */ int id = 1; Packet *packets[17]; memset(packets, 0x00, sizeof(packets)); /* * Original fragments. */ /* A*24 ...
defrag - take protocol into account during re-assembly The IP protocol was not being used to match fragments with their packets allowing a carefully constructed packet with a different protocol to be matched, allowing re-assembly to complete, creating a packet that would not be re-assembled by the destination host.
https://github.com/inliniac/suricata/commit/4a04f814b15762eb446a5ead4d69d021512df6f8
null
null
src/defrag.c
4
c
false
2017-02-05T13:57:54Z
function a(t,e,r){return t.highWaterMark!=null?t.highWaterMark:e?t[r]:null}
function a(t,e,r){var i=m.quantizationTable;var n,s,o,a,u,l,f,h,c;var d=r;var p;for(p=0;p<64;p++)d[p]=t[p]*i[p];for(p=0;p<8;++p){var g=8*p;if(d[1+g]==0&&d[2+g]==0&&d[3+g]==0&&d[4+g]==0&&d[5+g]==0&&d[6+g]==0&&d[7+g]==0){c=T*d[0+g]+512>>10;d[0+g]=c;d[1+g]=c;d[2+g]=c;d[3+g]=c;d[4+g]=c;d[5+g]=c;d[6+g]=c;d[7+g]=c;continue}n...
Fix a possible ReDoS
https://github.com/cronvel/terminal-kit/commit/a2e446cc3927b559d0281683feb9b821e83b758c
CVE-2021-4306
['CWE-1333']
browser/termkit.min.js
4
js
false
2021-10-12T09:55:03Z
function setHomePage() { $.ajax({ type: 'POST', url: baseurl + '/userSettings/setHomePage', data: { path: window.location.pathname }, success:function (data, textStatus) { showMessage('success', 'Homepage set.'); $('#setHomePage').addClass(...
function setHomePage() { $.ajax({ type: 'GET', url: baseurl + '/userSettings/setHomePage', success:function (data, textStatus) { $('#ajax_hidden_container').html(data); var currentPage = $('#setHomePage').data('current-page'); $('#UserSettingPath').val(cur...
fix: [security] setting a favourite homepage was not CSRF protected - a user could be lured into setting a MISP home-page outside of the MISP baseurl - switched the endpoint to be CSRF protection enabled - as discovered by Mislav Božičević <mislav.bozicevic@nn.cz>
https://github.com/MISP/MISP/commit/bf4610c947c7dc372c4078f363d2dff6ae0703a8
CVE-2020-15711
['CWE-352']
app/webroot/js/misp.js
4
js
false
2020-07-13T10:19:11Z
@Override public boolean isValid(Object value, ConstraintValidatorContext constraintValidatorContext) { if (!(value instanceof String) || ((String) value).isEmpty() || xssPolicy == null) { return true; } try { return xssChecker.scan((String) value, xssPolicy).getNumb...
@Override public boolean isValid(Object value, ConstraintValidatorContext constraintValidatorContext) { if (!(value instanceof String) || ((String) value).isEmpty()) { return true; } try { return xssChecker.scan((String) value, xssPolicy).getNumberOfErrors() == 0; ...
Fix XSS policy file loading
https://github.com/thingsboard/thingsboard-edge/commit/d4718ae3545f10c165255b49dfd0317273ae533b
null
null
dao/src/main/java/org/thingsboard/server/dao/service/NoXssValidator.java
4
java
false
2021-04-12T11:43:14Z
def _safe_read(fp, size): """ Reads large blocks in a safe way. Unlike fp.read(n), this function doesn't trust the user. If the requested size is larger than SAFEBLOCK, the file is read block by block. :param fp: File handle. Must implement a <b>read</b> method. :param size: Number of bytes ...
def _safe_read(fp, size): """ Reads large blocks in a safe way. Unlike fp.read(n), this function doesn't trust the user. If the requested size is larger than SAFEBLOCK, the file is read block by block. :param fp: File handle. Must implement a <b>read</b> method. :param size: Number of bytes ...
Fix DOS in PSDImagePlugin -- CVE-2021-28675 * PSDImagePlugin did not sanity check the number of input layers and vs the size of the data block, this could lead to a DOS on Image.open prior to Image.load. * This issue dates to the PIL fork
https://github.com/python-pillow/Pillow/commit/22e9bee4ef225c0edbb9323f94c26cee0c623497
null
null
src/PIL/ImageFile.py
4
py
false
2021-03-07T18:04:25Z
@Override public @Nullable Map<?, ?> toMap(int index) { Object obj = toJavaObject(index); if (obj instanceof Map) { return ((Map<?, ?>) obj); } if (C.lua_istable(L, index) == 1) { C.lua_pushnil(L); Map<Object, Object> map = new HashMap<>(); ...
@Override public @Nullable Map<?, ?> toMap(int index) { Object obj = toJavaObject(index); if (obj instanceof Map) { return ((Map<?, ?>) obj); } checkStack(2); if (C.lua_istable(L, index) == 1) { C.lua_pushnil(L); Map<Object, Object> map = n...
Fixed Lua stack overflow: causing memory corruption
https://github.com/gudzpoz/luajava/commit/83505ac0aaba37ed1b6434677bd4fd681b391926
null
null
luajava/src/main/java/party/iroiro/luajava/AbstractLua.java
4
java
false
2022-06-27T15:20:47Z
public void statusUpdate(Intent intent) { mHandler.post(() -> { if (mChildSessionsRemaining.size() == 0) { // no children to deal with, ignore. return; } final boolean destroyed; synchronized (mLock) { ...
public void statusUpdate(Intent intent) { mHandler.post(() -> { if (mChildSessionsRemaining.size() == 0) { // no children to deal with, ignore. return; } final boolean destroyed; synchronized (mLock) { ...
[RESTRICT AUTOMERGE] Fix bypass BG-FGS and BAL via package manager APIs Opt-in for BAL of PendingIntent for following APIs: * PackageInstaller.uninstall() * PackageInstaller.installExistingPackage() * PackageInstaller.uninstallExistingPackage() * PackageInstaller.Session.commit() * PackageInstaller.Session.commitTran...
https://github.com/PixelExperience/frameworks_base/commit/b0b1ddb4b4ba5db27f5616b02ae2cdca8b63496f
null
null
services/core/java/com/android/server/pm/PackageInstallerSession.java
4
java
false
2023-01-11T08:02:27Z
def values_from_list(values: List[str]) -> Dict[str, str]: """ Convert a list of values into dict of {name: value} """ output: Dict[str, str] = {} for i, value in enumerate(values): if value[0].isalpha(): key = value.upper() else: key = f"...
def values_from_list(values: List[str]) -> Dict[str, str]: """ Convert a list of values into dict of {name: value} """ output: Dict[str, str] = {} for i, value in enumerate(values): if value[0].isalpha(): key = value.upper() else: key = f"...
Merge pull request from GHSA-9x4c-63pf-525f * All strings used as file/directory names are now sanitized to address the path traversal vulnerabilities * Switched calls to utils.spinal_case to utils.kebab_case * Quotation marks are now escaped in all names/descriptions to address arbitrary code execution issues * Sa...
https://github.com/triaxtec/openapi-python-client/commit/f7a56aae32cba823a77a84a1f10400799b19c19a
null
null
openapi_python_client/parser/properties.py
4
py
false
2020-08-13T17:05:36Z
function sendFileInformations(file, peer_id, broadcast = false) { fileToSend = file; // check if valid if (fileToSend && fileToSend.size > 0) { // no peers in the room if (!thereIsPeerConnections()) { return userLog('info', 'No participants detected'); } let fileI...
function sendFileInformations(file, peer_id, broadcast = false) { fileToSend = file; // check if valid if (fileToSend && fileToSend.size > 0) { // no peers in the room if (!thereIsPeerConnections()) { return userLog('info', 'No participants detected'); } // preve...
[mirotalk] - #139 fix XSS
https://github.com/miroslavpejic85/mirotalk/commit/d96d3d426cca548a198a985d23d2c1cb76afc580
CVE-2023-27054
['CWE-79']
public/js/client.js
4
js
false
2023-02-18T08:09:13Z
static void nsc_encode_subsampling(NSC_CONTEXT* context) { UINT16 x; UINT16 y; BYTE* co_dst; BYTE* cg_dst; INT8* co_src0; INT8* co_src1; INT8* cg_src0; INT8* cg_src1; UINT32 tempWidth; UINT32 tempHeight; tempWidth = ROUND_UP_TO(context->width, 8); tempHeight = ROUND_UP_TO(context->height, 2); for (y = 0; ...
static BOOL nsc_encode_subsampling(NSC_CONTEXT* context) { UINT16 x; UINT16 y; UINT32 tempWidth; UINT32 tempHeight; if (!context) return FALSE; tempWidth = ROUND_UP_TO(context->width, 8); tempHeight = ROUND_UP_TO(context->height, 2); if (tempHeight == 0) return FALSE; if (tempWidth > context->priv->Pla...
Fixed CVE-2018-8788 Thanks to Eyal Itkin from Check Point Software Technologies.
https://github.com/FreeRDP/FreeRDP/commit/d1112c279bd1a327e8e4d0b5f371458bf2579659
null
null
libfreerdp/codec/nsc_encode.c
4
c
false
2018-10-22T14:52:21Z
render(markup, theme, options) { const html = htmlUtils.processImageTags(markup, data => { if (!data.src) return null; const r = utils.imageReplacement(this.ResourceModel_, data.src, options.resources, this.resourceBaseUrl_); if (!r) return null; if (typeof r === 'string') { return { type: 'rep...
async render(markup, theme, options) { const cacheKey = md5(escape(markup)); let html = this.cache_.get(cacheKey); if (!html) { html = htmlUtils.sanitizeHtml(markup); html = htmlUtils.processImageTags(html, data => { if (!data.src) return null; const r = utils.imageReplacement(this.ResourceModel_...
All: Security: Fixed potential Arbitrary File Read via XSS
https://github.com/laurent22/joplin/commit/3db47b575b9cb0a765da3d283baa2c065df0d0bc
CVE-2020-9038
['CWE-79']
ReactNativeClient/lib/joplin-renderer/HtmlToHtml.js
4
js
false
2020-02-13T23:59:23Z
@Override public boolean equals(Object o) { if (this == o) return true; if (o == null || getClass() != o.getClass()) return false; CliContext that = (CliContext) o; return doNative == that.doNative && anyExtensionsAllowed == that.anyExtensionsAllowed && hintAboutNonMustSupport == that.hint...
@Override public boolean equals(Object o) { if (this == o) return true; if (o == null || getClass() != o.getClass()) return false; CliContext that = (CliContext) o; return doNative == that.doNative && anyExtensionsAllowed == that.anyExtensionsAllowed && hintAboutNonMustSupport == that.hint...
add -no_unicode_bidi_control_chars to the validator for CVE-2021-42574 (https://trojansource.codes/)
https://github.com/hapifhir/org.hl7.fhir.core/commit/57edd95e8117c1f0450b361cc59fc2b8babab50c
null
null
org.hl7.fhir.validation/src/main/java/org/hl7/fhir/validation/cli/model/CliContext.java
4
java
false
2021-11-02T06:47:25Z
function ji(e){e.updatedDisplay=e.mustUpdate&&Ui(e.cm,e.update)}
function ji(e){var t=e.cm,n=t.display;e.updatedDisplay&&Jr(t),e.barMeasure=mi(t),n.maxLineChanged&&!t.options.lineWrapping&&(e.adjustWidthTo=er(t,n.maxLine,n.maxLine.text.length).left+3,t.display.sizerWidth=e.adjustWidthTo,e.barMeasure.scrollWidth=Math.max(n.scroller.clientWidth,n.sizer.offsetLeft+e.adjustWidthTo+Yn(t)...
fix: OPTIC-179: Properly ensure content is escaped (#4926) * fix: OPTIC-179: Properly ensure content is escaped * ci: Build frontend Workflow run: https://github.com/HumanSignal/label-studio/actions/runs/6567480699 * update types * ci: Build frontend Workflow run: https://github.com/HumanSignal/label-st...
https://github.com/HumanSignal/label-studio/commit/a7a71e594f32ec4af8f3f800d5ccb8662e275da3
CVE-2023-47115
['CWE-79']
label_studio/frontend/dist/react-app/index.js
4
js
false
2023-10-19T01:22:32Z
void ex_diffgetput(exarg_T *eap) { linenr_T lnum; int count; linenr_T off = 0; diff_T *dp; diff_T *dprev; diff_T *dfree; int idx_cur; int idx_other; int idx_from; int idx_to; int i; int added; char_u *p; aco_save_T aco; buf_T *buf; int start_skip, ...
void ex_diffgetput(exarg_T *eap) { linenr_T lnum; int count; linenr_T off = 0; diff_T *dp; diff_T *dprev; diff_T *dfree; int idx_cur; int idx_other; int idx_from; int idx_to; int i; int added; char_u *p; aco_save_T aco; buf_T *buf; int start_skip, ...
patch 9.0.0026: accessing freed memory with diff put Problem: Accessing freed memory with diff put. Solution: Bail out when diff pointer is no longer valid.
https://github.com/vim/vim/commit/c5274dd12224421f2430b30c53b881b9403d649e
null
null
src/diff.c
4
c
false
2022-07-02T14:10:00Z
static int rename_in_ns(int pid, char *oldname, char **newnamep) { int fd = -1, ofd = -1, ret, ifindex = -1; bool grab_newname = false; ofd = lxc_preserve_ns(getpid(), "net"); if (ofd < 0) { fprintf(stderr, "Failed opening network namespace path for '%d'.", getpid()); return -1; } fd = lxc_preserve_ns(pid, ...
static int rename_in_ns(int pid, char *oldname, char **newnamep) { uid_t ruid, suid, euid; int fret = -1; int fd = -1, ifindex = -1, ofd = -1, ret; bool grab_newname = false; ofd = lxc_preserve_ns(getpid(), "net"); if (ofd < 0) { usernic_error("Failed opening network namespace path for '%d'.", getpid()); ret...
CVE-2017-5985: Ensure target netns is caller-owned Before this commit, lxc-user-nic could potentially have been tricked into operating on a network namespace over which the caller did not hold privilege. This commit ensures that the caller is privileged over the network namespace by temporarily dropping privilege. L...
https://github.com/lxc/lxc/commit/16af238036a5464ae8f2420ed3af214f0de875f9
null
null
src/lxc/lxc_user_nic.c
4
c
false
2017-01-28T12:02:34Z
public override ServiceResult<NavigationEntity> Add(NavigationEntity item) { if (item.ParentId.IsNullOrEmpty()) { item.ParentId = "#"; } item.ID = Guid.NewGuid().ToString("N"); return base.Add(item); }
public override ServiceResult<NavigationEntity> Add(NavigationEntity item) { if (item.ParentId.IsNullOrEmpty()) { item.ParentId = "#"; } item.ID = Guid.NewGuid().ToString("N"); Santize(item); return base.Add(item); }
Sanitize Html #457
https://github.com/SeriaWei/ZKEACMS/commit/833c5460dc5c6152092f6ad54b8b832870a59903
null
null
src/ZKEACMS/Common/Service/NavigationService.cs
4
cs
false
2022-04-14T14:55:34Z
def parse_and_validate_server_name(server_name: str) -> Tuple[str, Optional[int]]: """Split a server name into host/port parts and do some basic validation. Args: server_name: server name to parse Returns: host/port parts. Raises: ValueError if the server name could not be par...
def parse_and_validate_server_name(server_name: str) -> Tuple[str, Optional[int]]: """Split a server name into host/port parts and do some basic validation. Args: server_name: server name to parse Returns: host/port parts. Raises: ValueError if the server name could not be par...
Prevent the media store from writing outside of the configured directory Also tighten validation of server names by forbidding invalid characters in IPv6 addresses and empty domain labels.
https://github.com/matrix-org/synapse/commit/91f2bd090
null
null
synapse/util/stringutils.py
4
py
false
2021-11-19T13:39:15Z
def getaddresses(fieldvalues): """Return a list of (REALNAME, EMAIL) for each fieldvalue.""" all = COMMASPACE.join(str(v) for v in fieldvalues) a = _AddressList(all) return a.addresslist
def getaddresses(fieldvalues): """Return a list of (REALNAME, EMAIL) or ('','') for each fieldvalue. When parsing fails for a fieldvalue, a 2-tuple of ('', '') is returned in its place. If the resulting list of parsed address is not the same as the number of fieldvalues in the input list a parsing...
Merge remote-tracking branch 'upstream/main' into 106242
https://github.com/python/cpython/commit/199abac9b1bd6737df6b7d202ffdbf50728a9c50
null
null
Lib/email/utils.py
4
py
false
2023-07-13T19:43:45Z
static int xfs_iget_cache_hit( struct xfs_perag *pag, struct xfs_inode *ip, xfs_ino_t ino, int flags, int lock_flags) __releases(RCU) { struct inode *inode = VFS_I(ip); struct xfs_mount *mp = ip->i_mount; int error; /* * check for re-use of an inode within an RCU grace period due to the * radix tr...
static int xfs_iget_cache_hit( struct xfs_perag *pag, struct xfs_inode *ip, xfs_ino_t ino, int flags, int lock_flags) __releases(RCU) { struct inode *inode = VFS_I(ip); struct xfs_mount *mp = ip->i_mount; int error; /* * check for re-use of an inode within an RCU grace period due to the * radix tr...
xfs: validate cached inodes are free when allocated A recent fuzzed filesystem image cached random dcache corruption when the reproducer was run. This often showed up as panics in lookup_slow() on a null inode->i_ops pointer when doing pathwalks. BUG: unable to handle kernel NULL pointer dereference at 00000000000000...
https://github.com/torvalds/linux/commit/afca6c5b2595fc44383919fba740c194b0b76aff
null
null
fs/xfs/xfs_icache.c
4
c
false
2018-04-18T00:17:34Z
static int list_session(char *log_dir, regex_t *re, const char *user, const char *tty) { char idbuf[7], *idstr, *cp; struct eventlog *evlog = NULL; const char *timestr; int ret = -1; debug_decl(list_session, SUDO_DEBUG_UTIL); if ((evlog = iolog_parse_loginfo(-1, log_dir)) == NULL) goto done; ...
static int list_session(struct sudo_lbuf *lbuf, char *log_dir, regex_t *re, const char *user, const char *tty) { char idbuf[7], *idstr, *cp; struct eventlog *evlog = NULL; const char *timestr; int i, ret = -1; debug_decl(list_session, SUDO_DEBUG_UTIL); if ((evlog = iolog_parse_loginfo(-1, l...
Escape control characters in log messages and "sudoreplay -l" output. The log message contains user-controlled strings that could include things like terminal control characters. Space characters in the command path are now also escaped. Command line arguments that contain spaces are surrounded with single quotes and...
https://github.com/sudo-project/sudo/commit/334daf92b31b79ce68ed75e2ee14fca265f029ca
null
null
plugins/sudoers/sudoreplay.c
4
c
false
2023-01-18T15:21:34Z
void WebPImage::decodeChunks(uint64_t filesize) { DataBuf chunkId(5); byte size_buff[WEBP_TAG_SIZE]; bool has_canvas_data = false; #ifdef DEBUG std::cout << "Reading metadata" << std::endl; #endif chunkId.pData_[4] = '\0' ; while ( !io_->eof() && (uint64...
void WebPImage::decodeChunks(uint32_t filesize) { DataBuf chunkId(5); byte size_buff[WEBP_TAG_SIZE]; bool has_canvas_data = false; #ifdef DEBUG std::cout << "Reading metadata" << std::endl; #endif chunkId.pData_[4] = '\0' ; while ( !io_->eof() && (uint64...
Avoid negative integer overflow when `filesize < io_->tell()`. This fixes #791.
https://github.com/Exiv2/exiv2/commit/b5ea62faabdaa1b885b0545c5193769889eb5993
null
null
src/webpimage.cpp
4
cpp
false
2019-04-26T09:21:46Z
static inline void handle_socket_receive_unknown( fastd_socket_t *sock, const fastd_peer_address_t *local_addr, const fastd_peer_address_t *remote_addr, fastd_buffer_t *buffer) { const uint8_t *packet_type = buffer->data; switch (*packet_type) { case PACKET_DATA: fastd_buffer_free(buffer); if (!backoff_unkno...
static inline void handle_socket_receive_unknown( fastd_socket_t *sock, const fastd_peer_address_t *local_addr, const fastd_peer_address_t *remote_addr, fastd_buffer_t *buffer) { const uint8_t *packet_type = buffer->data; switch (*packet_type) { case PACKET_DATA: fastd_buffer_free(buffer); if (!backoff_unkno...
receive: fix buffer leak when receiving invalid packets For fastd versions before v20, this was just a memory leak (which could still be used for DoS, as it's remotely triggerable). With the new buffer management of fastd v20, this will trigger an assertion failure instead as soon as the buffer pool is empty.
https://github.com/NeoRaider/fastd/commit/737925113363b6130879729cdff9ccc46c33eaea
null
null
src/receive.c
4
c
false
2020-10-19T19:08:16Z
static int analop(RAnal *a, RAnalOp *op, ut64 addr, const ut8 *buf, int len, RAnalOpMask mask) { int opsize = -1; op->type = -1; opsize = 2; switch (buf[0]) { case 0x3f: case 0x4f: op->type = R_ANAL_OP_TYPE_MOV; opsize = 4; break; case 0x6f: op->type = R_ANAL_OP_TYPE_MOV; opsize = 6; break; case 0x7...
static int analop(RAnal *a, RAnalOp *op, ut64 addr, const ut8 *buf, int len, RAnalOpMask mask) { int opsize = -1; op->type = -1; opsize = 2; if (len < 1) { return -1; } switch (buf[0]) { case 0x3f: case 0x4f: op->type = R_ANAL_OP_TYPE_MOV; opsize = 4; break; case 0x6f: op->type = R_ANAL_OP_TYPE_MOV; ...
Fix 1 byte oobread in the cris analysis plugin ##crash
https://github.com/radareorg/radare2/commit/605785b65dd356d46d4487faa41dbf90943b8bc1
null
null
libr/anal/p/anal_cris.c
4
c
false
2022-04-01T19:03:24Z
def serve_file_download_backend( request: HttpRequest, user_profile: UserProfile, realm_id_str: str, filename: str ) -> HttpResponseBase: return serve_file(request, user_profile, realm_id_str, filename, url_only=False, download=True)
def serve_file_download_backend( request: HttpRequest, user_profile: UserProfile, realm_id_str: str, filename: str ) -> HttpResponseBase: return serve_file( request, user_profile, realm_id_str, filename, url_only=False, force_download=True )
CVE-2023-22735: Provide the Content-Disposition header from S3. The Content-Type of user-provided uploads was provided by the browser at initial upload time, and stored in S3; however, 04cf68b45ebb switched to determining the Content-Disposition merely from the filename. This makes uploads vulnerable to a stored XSS,...
https://github.com/zulip/zulip/commit/2f6c5a883e106aa82a570d3d1f243993284b70f3
null
null
zerver/views/upload.py
4
py
false
2023-01-11T16:36:41Z