id stringlengths 13 16 | title stringlengths 0 185 | description stringlengths 35 3.88k | patches listlengths 1 7 | cwe stringclasses 636
values |
|---|---|---|---|---|
CVE-2025-61919 | Rack is vulnerable to a memory-exhaustion DoS through unbounded URL-encoded body parsing | Rack is a modular Ruby web server interface. Prior to versions 2.2.20, 3.1.18, and 3.2.3, `Rack::Request#POST` reads the entire request body into memory for `Content-Type: application/x-www-form-urlencoded`, calling `rack.input.read(nil)` without enforcing a length or cap. Large request bodies can therefore be buffered... | [
{
"url": "https://github.com/rack/rack/commit/cbd541e8a3d0c5830a3c9a30d3718ce2e124f9db",
"patch_text_b64": "RnJvbSBjYmQ1NDFlOGEzZDBjNTgzMGEzYzlhMzBkMzcxOGNlMmUxMjRmOWRiIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBTYW11ZWwgV2lsbGlhbXMgPHNhbXVlbC53aWxsaWFtc0BvcmlvbnRyYW5zZmVyLmNvLm56PgpEYXRlOiBUaHUsIDkgT2N0IDIw... | CWE-400: Uncontrolled Resource Consumption |
CVE-2025-61780 | Rack has Possible Information Disclosure Vulnerability | Rack is a modular Ruby web server interface. Prior to versions 2.2.20, 3.1.18, and 3.2.3, a possible information disclosure vulnerability existed in `Rack::Sendfile` when running behind a proxy that supports `x-sendfile` headers (such as Nginx). Specially crafted headers could cause `Rack::Sendfile` to miscommunicate w... | [
{
"url": "https://github.com/rack/rack/commit/57277b7741581fa827472c5c666f6e6a33abd784",
"patch_text_b64": "RnJvbSA1NzI3N2I3NzQxNTgxZmE4Mjc0NzJjNWM2NjZmNmU2YTMzYWJkNzg0IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBTYW11ZWwgV2lsbGlhbXMgPHNhbXVlbC53aWxsaWFtc0BvcmlvbnRyYW5zZmVyLmNvLm56PgpEYXRlOiBUdWUsIDcgT2N0IDIw... | CWE-200: Exposure of Sensitive Information to an Unauthorized Actor |
CVE-2024-0217 | Packagekitd: use-after-free in idle function callback | A use-after-free flaw was found in PackageKitd. In some conditions, the order of cleanup mechanics for a transaction could be impacted. As a result, some memory access could occur on memory regions that were previously freed. Once freed, a memory region can be reused for other allocations and any previously stored data... | [
{
"url": "https://github.com/PackageKit/PackageKit/commit/64278c9127e3333342b56ead99556161f7e86f79",
"patch_text_b64": "RnJvbSA2NDI3OGM5MTI3ZTMzMzMzNDJiNTZlYWQ5OTU1NjE2MWY3ZTg2Zjc5IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBQaGlsaXAgV2l0aG5hbGwgPHB3aXRobmFsbEBlbmRsZXNzb3Mub3JnPgpEYXRlOiBXZWQsIDE1IE1hciAyMDIz... | CWE-416 - Use After Free |
CVE-2023-4385 | Kernel: jfs: null pointer dereference in dbfree() | A NULL pointer dereference flaw was found in dbFree in fs/jfs/jfs_dmap.c in the journaling file system (JFS) in the Linux Kernel. This issue may allow a local attacker to crash the system due to a missing sanity check. | [
{
"url": "https://github.com/torvalds/linux/commit/0d4837fdb796f99369cf7691d33de1b856bcaf1f",
"patch_text_b64": "RnJvbSAwZDQ4MzdmZGI3OTZmOTkzNjljZjc2OTFkMzNkZTFiODU2YmNhZjFmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBaaXh1YW4gRnUgPHIzM3MzbjZAZ21haWwuY29tPgpEYXRlOiBNb24sIDExIEFwciAyMDIyIDE4OjQ1OjM0ICswODAwClN... | CWE-476 - NULL Pointer Dereference |
CVE-2023-5341 | Imagemagick: heap use-after-free in coders/bmp.c | A heap use-after-free flaw was found in coders/bmp.c in ImageMagick. | [
{
"url": "https://github.com/ImageMagick/ImageMagick/commit/aa673b2e4defc7cad5bec16c4fc8324f71e531f1",
"patch_text_b64": "RnJvbSBhYTY3M2IyZTRkZWZjN2NhZDViZWMxNmM0ZmM4MzI0ZjcxZTUzMWYxIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBDcmlzdHkgPHVyYmFuLXdhcnJpb3JAaW1hZ2VtYWdpY2sub3JnPgpEYXRlOiBTdW4sIDI0IFNlcCAyMDIzID... | CWE-416 - Use After Free |
CVE-2025-8194 | Tarfile infinite loop during parsing with negative member offset | There is a defect in the CPython “tarfile” module affecting the “TarFile” extraction and entry enumeration APIs. The tar implementation would process tar archives with negative offsets without error, resulting in an infinite loop and deadlock during the parsing of maliciously crafted tar archives.
This vulnerability ... | [
{
"url": "https://github.com/python/cpython/commit/57f5981d6260ed21266e0c26951b8564cc252bc2",
"patch_text_b64": "RnJvbSA1N2Y1OTgxZDYyNjBlZDIxMjY2ZTBjMjY5NTFiODU2NGNjMjUyYmMyIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBWaWN0b3IgU3Rpbm5lciA8dnN0aW5uZXJAcHl0aG9uLm9yZz4KRGF0ZTogVHVlLCAyIFNlcCAyMDI1IDIwOjIwOjI3ICs... | CWE-835 Loop with Unreachable Exit Condition ('Infinite Loop') |
CVE-2025-6069 | HTMLParser quadratic complexity when processing malformed inputs | The html.parser.HTMLParser class had worse-case quadratic complexity when processing certain crafted malformed inputs potentially leading to amplified denial-of-service. | [
{
"url": "https://github.com/python/cpython/commit/fdc9d214c01cb4588f540cfa03726bbf2a33fc15",
"patch_text_b64": "RnJvbSBmZGM5ZDIxNGMwMWNiNDU4OGY1NDBjZmEwMzcyNmJiZjJhMzNmYzE1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBTZXJoaXkgU3RvcmNoYWthIDxzdG9yY2hha2FAZ21haWwuY29tPgpEYXRlOiBGcmksIDQgSnVsIDIwMjUgMDA6MDU6NTM... | CWE-1333 Inefficient Regular Expression Complexity |
CVE-2025-61787 | Deno is Vulnerable to Command Injection on Windows During Batch File Execution | Deno is a JavaScript, TypeScript, and WebAssembly runtime. Versions prior to 2.5.3 and 2.2.15 are vulnerable to Command Line Injection attacks on Windows when batch files are executed. In Windows, ``CreateProcess()`` always implicitly spawns ``cmd.exe`` if a batch file (.bat, .cmd, etc.) is being executed even if the a... | [
{
"url": "https://github.com/denoland/deno/commit/8a0990ccd37bafd8768176ca64b906ba2da2d822",
"patch_text_b64": "RnJvbSA4YTA5OTBjY2QzN2JhZmQ4NzY4MTc2Y2E2NGI5MDZiYTJkYTJkODIyIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBEaXZ5IDxkai5zcml2YXN0YXZhMjNAZ21haWwuY29tPgpEYXRlOiBXZWQsIDI0IFNlcCAyMDI1IDEwOjM1OjM3ICswNTMw... | CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') |
CVE-2025-61788 | Opencast Paella Player 7 vulnerable to Cross-Site-Scripting | Opencast is a free, open-source platform to support the management of educational audio and video content. Prior to Opencast 17.8 and 18.2, the paella would include and render some user inputs (metadata like title, description, etc.) unfiltered and unmodified. The vulnerability allows attackers to inject and malicious ... | [
{
"url": "https://github.com/opencast/opencast/commit/2809520fa88d108d8104c760f00c10bad42c14f9",
"patch_text_b64": "RnJvbSBhYTcwZTRhMTczNGVlYTJlOWJjZWFlNTJlOTJmMDBhNTQwMmE0M2FiIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBNaWd1ZWwgRXNjcml2YSA8bWllc2dyZUBnbWFpbC5jb20+CkRhdGU6IFdlZCwgMTcgU2VwIDIwMjUgMTE6NTY6MTkg... | CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
CVE-2024-11831 | Npm-serialize-javascript: cross-site scripting (xss) in serialize-javascript | A flaw was found in npm-serialize-javascript. The vulnerability occurs because the serialize-javascript module does not properly sanitize certain inputs, such as regex or other JavaScript object types, allowing an attacker to inject malicious code. This code could be executed when deserialized by a web browser, causing... | [
{
"url": "https://github.com/yahoo/serialize-javascript/commit/f27d65d3de42affe2aac14607066c293891cec4e",
"patch_text_b64": "RnJvbSBmMjdkNjVkM2RlNDJhZmZlMmFhYzE0NjA3MDY2YzI5Mzg5MWNlYzRlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBSeWFuIERlbGFuZXkgPHJ5YW5AcmV2ZXJlY3JlLmNvbT4KRGF0ZTogTW9uLCA4IEphbiAyMDI0IDE3OjA... | CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
CVE-2025-61672 | Synapse: Invalid device keys degrade federation functionality | Synapse is an open source Matrix homeserver implementation. Lack of validation for device keys in Synapse before 1.138.3 and in Synapse 1.139.0 allow an attacker registered on the victim homeserver to degrade federation functionality, unpredictably breaking outbound federation to other homeservers. The issue is patched... | [
{
"url": "https://github.com/element-hq/synapse/commit/26aaaf9e48fff80cf67a20c691c75d670034b3c1",
"patch_text_b64": "RnJvbSAyNmFhYWY5ZTQ4ZmZmODBjZjY3YTIwYzY5MWM3NWQ2NzAwMzRiM2MxIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBUaWxsIDwyMzUzMTAwK1M3ZXZpbktAdXNlcnMubm9yZXBseS5naXRodWIuY29tPgpEYXRlOiBUdWUsIDcgT2N0IDI... | CWE-1287: Improper Validation of Specified Type of Input |
CVE-2024-8088 | Infinite loop when iterating over zip archive entry names from zipfile.Path | There is a HIGH severity vulnerability affecting the CPython "zipfile"
module affecting "zipfile.Path". Note that the more common API "zipfile.ZipFile" class is unaffected.
When iterating over names of entries in a zip archive (for example, methods
of "zipfile.Path" like "namelist()", "iterdir()", etc)
the process... | [
{
"url": "https://github.com/python/cpython/commit/7bc367e464ce50b956dd232c1dfa1cad4e7fb814",
"patch_text_b64": "RnJvbSA3YmMzNjdlNDY0Y2U1MGI5NTZkZDIzMmMxZGZhMWNhZDRlN2ZiODE0IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiAiSmFzb24gUi4gQ29vbWJzIiA8amFyYWNvQGphcmFjby5jb20+CkRhdGU6IFdlZCwgNCBTZXAgMjAyNCAxMTo0MDo1NiA... | CWE-835 Loop with Unreachable Exit Condition ('Infinite Loop') |
CVE-2025-61771 | Rack's multipart parser buffers large non‑file fields entirely in memory, enabling DoS (memory exhaustion) | Rack is a modular Ruby web server interface. In versions prior to 2.2.19, 3.1.17, and 3.2.2, ``Rack::Multipart::Parser` stores non-file form fields (parts without a `filename`) entirely in memory as Ruby `String` objects. A single large text field in a multipart/form-data request (hundreds of megabytes or more) can con... | [
{
"url": "https://github.com/rack/rack/commit/589127f4ac8b5cf11cf88fb0cd116ffed4d2181e",
"patch_text_b64": "RnJvbSA1ODkxMjdmNGFjOGI1Y2YxMWNmODhmYjBjZDExNmZmZWQ0ZDIxODFlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBKZXJlbXkgRXZhbnMgPGNvZGVAamVyZW15ZXZhbnMubmV0PgpEYXRlOiBNb24sIDE1IFNlcCAyMDI1IDE3OjE3OjAzIC0wNzAw... | CWE-400: Uncontrolled Resource Consumption |
CVE-2025-61772 | Rack's multipart parser buffers unbounded per-part headers, enabling DoS (memory exhaustion) | Rack is a modular Ruby web server interface. In versions prior to 2.2.19, 3.1.17, and 3.2.2, `Rack::Multipart::Parser` can accumulate unbounded data when a multipart part’s header block never terminates with the required blank line (`CRLFCRLF`). The parser keeps appending incoming bytes to memory without a size cap, al... | [
{
"url": "https://github.com/rack/rack/commit/589127f4ac8b5cf11cf88fb0cd116ffed4d2181e",
"patch_text_b64": "RnJvbSA1ODkxMjdmNGFjOGI1Y2YxMWNmODhmYjBjZDExNmZmZWQ0ZDIxODFlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBKZXJlbXkgRXZhbnMgPGNvZGVAamVyZW15ZXZhbnMubmV0PgpEYXRlOiBNb24sIDE1IFNlcCAyMDI1IDE3OjE3OjAzIC0wNzAw... | CWE-400: Uncontrolled Resource Consumption |
CVE-2025-61770 | Rack's unbounded multipart preamble buffering enables DoS (memory exhaustion) | Rack is a modular Ruby web server interface. In versions prior to 2.2.19, 3.1.17, and 3.2.2, `Rack::Multipart::Parser` buffers the entire multipart preamble (bytes before the first boundary) in memory without any size limit. A client can send a large preamble followed by a valid boundary, causing significant memory use... | [
{
"url": "https://github.com/rack/rack/commit/589127f4ac8b5cf11cf88fb0cd116ffed4d2181e",
"patch_text_b64": "RnJvbSA1ODkxMjdmNGFjOGI1Y2YxMWNmODhmYjBjZDExNmZmZWQ0ZDIxODFlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBKZXJlbXkgRXZhbnMgPGNvZGVAamVyZW15ZXZhbnMubmV0PgpEYXRlOiBNb24sIDE1IFNlcCAyMDI1IDE3OjE3OjAzIC0wNzAw... | CWE-400: Uncontrolled Resource Consumption |
CVE-2025-61962 | In fetchmail before 6.5.6, the SMTP client can crash when authenticating upon receiving a 334 status code in a malformed context. | [
{
"url": "https://gitlab.com/fetchmail/fetchmail/-/commit/4c3cebfa4e659fb778ca2cae0ccb3f69201609a8",
"patch_text_b64": "RnJvbSA0YzNjZWJmYTRlNjU5ZmI3NzhjYTJjYWUwY2NiM2Y2OTIwMTYwOWE4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBNYXR0aGlhcyBBbmRyZWUgPG1hdHRoaWFzLmFuZHJlZUBnbXguZGU+CkRhdGU6IEZyaSwgMyBPY3QgMjAyNSAx... | CWE-142 Improper Neutralization of Value Delimiters | |
CVE-2025-3193 | Versions of the package algoliasearch-helper from 2.0.0-rc1 and before 3.11.2 are vulnerable to Prototype Pollution in the _merge() function in merge.js, which allows constructor.prototype to be written even though doing so throws an error. In the "extreme edge-case" that the resulting error is caught, code injected in... | [
{
"url": "https://github.com/algolia/algoliasearch-helper-js/commit/776dff23c87b0902e554e02a8c2567d2580fe12a",
"patch_text_b64": "RnJvbSA3NzZkZmYyM2M4N2IwOTAyZTU1NGUwMmE4YzI1NjdkMjU4MGZlMTJhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBIYXJvZW4gVmlhZW5lIDxoZWxsb0BoYXJvZW4ubWU+CkRhdGU6IE1vbiwgOSBKYW4gMjAyMyAxMD... | CWE-1321 - Prototype Pollution | |
CVE-2025-61606 | WeGIA: Open Redirect Vulnerability in `control.php` endpoint | WeGIA is an open source web manager with a focus on charitable institutions. Versions 3.4.12 and below contain an Open Redirect vulnerability, identified in the control.php endpoint, specifically in the nextPage parameter (metodo=listarUmnomeClasse=FuncionarioControle). This vulnerability allows attackers to redirect u... | [
{
"url": "https://github.com/LabRedesCefetRJ/WeGIA/commit/85051ad14b1e7fa14116e74a90c0bd5480b2ec84",
"patch_text_b64": "RnJvbSA4NTA1MWFkMTRiMWU3ZmExNDExNmU3NGE5MGMwYmQ1NDgwYjJlYzg0IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBHYWJyaWVsUGludG9Tb3V6YSA8Z2FicmllbHBpbnRvc291ejRAZ21haWwuY29tPgpEYXRlOiBUaHUsIDExIFNl... | CWE-601: URL Redirection to Untrusted Site ('Open Redirect') |
End of preview. Expand in Data Studio
README.md exists but content is empty.
- Downloads last month
- 13