The vulnerability described is a stored Cross-Site Scripting (XSS) issue in the Harbor repository information page. The analysis of the provided patches confirms this. All three commits (76c2c5f7cfd9edb356cbb373889a59cc3217a058, a13a16383a41a8e20f524593cb290dc52f86f088, and f019430872118852f83f96cac9c587b89052d1e5) point to the same code change in the src/server/v2.0/handler/repository.go file. The change is within the UpdateRepository function of the repositoryAPI struct. The patch introduces the use of template.HTMLEscapeString to sanitize the Description field of the repository before it's updated. This indicates that previously the input was not being sanitized, thus allowing for the injection of malicious scripts. When another user views the repository information, the malicious script would execute in their browser. Therefore, the repositoryAPI.UpdateRepository function is the vulnerable function as it is responsible for processing and storing the tainted data.