id stringlengths 12 19 | title stringlengths 0 237 | description stringlengths 35 3.87k ⌀ | patches listlengths 1 22 | cwe stringlengths 2 440 ⌀ |
|---|---|---|---|---|
GHSA-v8xr-mc49-hfww | null | [
{
"commit_message": "[PATCH] scsi: megaraid_sas: return error when create DMA pool failed when create DMA pool for cmd frames failed, we should return -ENOMEM, instead of 0. In some case in: megasas_init_adapter_fusion() -->megasas_alloc_cmds() -->megasas_create_frame_pool create DMA pool failed, --> megasas_fr... | null | |
CVE-2014-3153 | The futex_requeue function in kernel/futex.c in the Linux kernel through 3.14.5 does not ensure that calls have two different futex addresses, which allows local users to gain privileges via a crafted FUTEX_REQUEUE command that facilitates unsafe waiter modification. | [
{
"commit_message": "[PATCH] futex-prevent-requeue-pi-on-same-futex.patch futex: Forbid uaddr == uaddr2 in futex_requeue(..., requeue_pi=1) If uaddr == uaddr2, then we have broken the rule of only requeueing from a non-pi futex to a pi futex with this call. If we attempt this, then dangling pointers may be lef... | n/a | |
GHSA-839c-8x38-qf59 | null | [
{
"commit_message": "[PATCH] adapter: Fix storing discoverable setting discoverable setting shall only be store when changed via Discoverable property and not when discovery client set it as that be considered temporary just for the lifetime of the discovery. src/adapter.c | 35 ++++++++++++++++++++++-----------... | null | |
CVE-2016-0723 | Race condition in the tty_ioctl function in drivers/tty/tty_io.c in the Linux kernel through 4.4.1 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free and system crash) by making a TIOCGETD ioctl call during processing of a TIOCSETD ioctl call. | [
{
"commit_message": "[PATCH] tty: Fix unsafe ldisc reference via ioctl(TIOCGETD) ioctl(TIOCGETD) retrieves the line discipline id directly from the ldisc because the line discipline id (c_line) in termios is untrustworthy; userspace may have set termios via ioctl(TCSETS*) without actually changing the line disc... | n/a | |
CVE-2017-9364 | Unrestricted File Upload exists in BigTree CMS through 4.2.18: if an attacker uploads an 'xxx.pht' or 'xxx.phtml' file, they could bypass a safety check and execute any code. | [
{
"commit_message": "[PATCH] Disabling phtml/pht files from being uploaded. https://github.com/bigtreecms/BigTree-CMS/issues/280 core/inc/bigtree/apis/storage.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSBiNzIyOTM5NDY5NTFjYzY1MGVhZjUxZjVkMmY2MmNlYWM2MzM1ZTEyIE1vbiBTZXA... | n/a | |
GHSA-xqxm-2rpm-3889 | Comment reply notifications sent to incorrect users | null | [
{
"commit_message": "[PATCH] Fix commenting thread notifications being sent to non-thread users wagtail/admin/tests/pages/test_edit_page.py | 22 +++++++++++++++++++++ wagtail/admin/views/pages/edit.py | 6 +++--- 2 files changed, 25 insertions(+), 3 deletions(-)",
"patch_text_b64": "RnJvbSA1ZmU5MD... | null |
GHSA-q8gg-vj6m-hgmj | @braintree/sanitize-url Cross-site Scripting vulnerability | null | [
{
"commit_message": "[PATCH] Fix html entity tab (#45) * fix: correct urls that did not sanitize html encoded colons * fix: replace html encoded tabs * update CHANGELOG.md Co-authored-by: Blade Barringer <blade.barringer@paypal.com> CHANGELOG.md | 5 +++++ src/__tests__/test.ts | 10 ++++++++++ src/inde... | null |
CVE-2022-47941 | An issue was discovered in ksmbd in the Linux kernel 5.15 through 5.19 before 5.19.2. fs/ksmbd/smb2pdu.c omits a kfree call in certain smb2_handle_negotiate error conditions, aka a memory leak. | [
{
"commit_message": "[PATCH] ksmbd: fix memory leak in smb2_handle_negotiate The allocated memory didn't free under an error path in smb2_handle_negotiate(). Fixes: e2f34481b24d (\"cifsd: add server-side procedures for SMB3\") Cc: stable@vger.kernel.org Reported-by: zdi-disclosures@trendmicro.com # ZDI-CAN-1781... | n/a | |
GHSA-vfm5-rmrh-j26v | Possible Content Security Policy bypass in Action Dispatch | null | [
{
"commit_message": "[PATCH] Add CSP directive validation Validate directives to make sure they don't include semicolons or whitespace. These are special and denote lists and termination of directives. [CVE-2024-54133] actionpack/CHANGELOG.md | 8 ++++++ .../http/content_security_policy.rb... | null |
CVE-2019-20042 | In wp-includes/formatting.php in WordPress 3.7 to 5.3.0, the function wp_targeted_link_rel() can be used in a particular way to result in a stored cross-site scripting (XSS) vulnerability. This has been patched in WordPress 5.3.1, along with all the previous WordPress versions from 3.7 to 5.3 via a minor release. | [
{
"commit_message": "[PATCH] Prevent stored XSS through wp_targeted_link_rel(). Brings r46894 to the 5.3 branch. Props: vortfu, whyisjake, peterwilsoncc, xknown, SergeyBiryukov, flaviozavan. git-svn-id: https://develop.svn.wordpress.org/branches/5.3@46898 602fd350-edb4-49c9-b593-d223f7449a82 src/wp-includes/f... | n/a | |
CVE-2023-5289 | Allocation of Resources Without Limits or Throttling in ikus060/rdiffweb | Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffweb prior to 2.8.4. | [
{
"commit_message": "[PATCH] Add ratelimit to AccessToken, SSH Keys, User creation rdiffweb/controller/page_admin_users.py | 10 ++++------ rdiffweb/controller/page_pref_sshkeys.py | 1 + rdiffweb/controller/page_pref_tokens.py | 1 + 3 files changed, 6 insertions(+), 6 deletions(-)",
"patch_text_b64": "Rn... | CWE-770 Allocation of Resources Without Limits or Throttling |
GHSA-f7f6-9jq7-3rqj | estree-util-value-to-estree allows prototype pollution in generated ESTree | null | [
{
"commit_message": "[PATCH] Fix __proto__ property emit MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit The `__proto__` property is a special use case. It can be defined as a computed property in an object expression, or via `defineProperty`. If it’s assigned via a non... | null |
GHSA-vwg4-846x-f94v | usememos/memos vulnerable to improper authorization | null | [
{
"commit_message": "[PATCH] fix: disable decode patch id (#831) api/memo.go | 2 +- api/resource.go | 2 +- api/shortcut.go | 2 +- api/user.go | 2 +- 4 files changed, 4 insertions(+), 4 deletions(-)",
"patch_text_b64": "RnJvbSBkY2EzNWJkZTg3N2FhYjZlNjRlZjUxYjUyZTU5MGI1ZDQ4ZjY5MmY5IE1vbiBTZXAgMTcgMDA6M... | null |
GHSA-79rq-pp6p-6hmr | null | [
{
"commit_message": "[PATCH] fixed #1783 (fuzz) src/isomedia/isom_intern.c | 1 + 1 file changed, 1 insertion(+)",
"patch_text_b64": "RnJvbSBmZTUxNTVjZjA0NzI1MmQxYzRjYjkxNjAyMDQ4YmZhNjgyYWYwZWE3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBqZWFubGYgPGplYW5sZkBncGFjLmlvPgpEYXRlOiBNb24sIDEwIE1heSAyMDIxIDExOjE4OjU... | null | |
GHSA-rp8h-vr48-4j8p | Apache Tomcat Exposes IP Addresses and HTTP Headers of Requests | null | [
{
"commit_message": "[PATCH] Fix https://issues.apache.org/bugzilla/show_bug.cgi?id=51872 Ensure access log always logs the correct remote IP. Ensure requests with multiple errors do not result in multiple access log entries. git-svn-id: https://svn.apache.org/repos/asf/tomcat/tc7.0.x/trunk@1176592 13f79535-47b... | null |
CVE-2020-15197 | Denial of Service in Tensorflow | In Tensorflow before version 2.3.1, the `SparseCountSparseOutput` implementation does not validate that the input arguments form a valid sparse tensor. In particular, there is no validation that the `indices` tensor has rank 2. This tensor must be a matrix because code assumes its elements are accessed as elements of a matrix. However, malicious users can pass in tensors of different rank, resulting in a `CHECK` assertion failure and a crash. This can be used to cause denial of service in serving installations, if users are allowed to control the components of the input sparse tensor. The issue is patched in commit 3cbb917b4714766030b28eba9fb41bb97ce9ee02 and is released in TensorFlow version 2.3.1. | [
{
"commit_message": "[PATCH] Fix multiple vulnerabilities in `tf.raw_ops.*CountSparseOutput`. Also add tests for these API points, both for the happy paths and for the vulnerable ones. PiperOrigin-RevId: 332563222 Change-Id: Ib3b52116a83a134c2e742a7c66e5e956db8fba05 tensorflow/core/kernels/count_ops.cc | ... | {"CWE-617":"Reachable Assertion"} |
GHSA-pqjc-5x4q-33rx | null | [
{
"commit_message": "[PATCH] [media] media-device: fix infoleak in ioctl media_enum_entities() MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit This fixes CVE-2014-1739. Signed-off-by: Salva Peiró <speiro@ai2.upv.es> Acked-by: Laurent Pinchart <laurent.pinchart@ideasonbo... | null | |
CVE-2023-32698 | nfpm vulnerable to Incorrect Default Permissions | nFPM is an alternative to fpm. The file permissions on the checked-in files were not maintained. Hence, when nfpm packaged
the files (without extra config for enforcing it’s own permissions) files could go out with bad permissions (chmod 666 or 777). Anyone using nfpm for creating packages without checking/setting file permissions before packaging could result in bad permissions for files/folders. | [
{
"commit_message": "[PATCH] sec: fix for CVE-2023-32698 This commit merely documents all commits related to fixing CVE-2023-32698, as they were a bit spread. It also has the intent of showing up properly in our changelog. Here's the commit list: * 8e517cca1704e5af68769e9401e51ea139022f9c * f64a311eefea340cd3f2... | CWE-276: Incorrect Default Permissions |
GHSA-vw4f-g2ch-x868 | null | [
{
"commit_message": "[PATCH] ofz#889 readjust jpeg import MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Change-Id: I4e25db429b8dee9265ab2ad468c21cc34a50df6c Reviewed-on: https://gerrit.libreoffice.org/35325 Tested-by: Jenkins <ci@libreoffice.org> Reviewed-by: Caolán M... | null | |
GHSA-9q2q-rv8x-x676 | null | [
{
"commit_message": "[PATCH] Add session regenerate after login & logout. Secure cookie if HTTPS. close #1473 system/core/config.php | 2 +- system/core/user.php | 21 ++++++++++++++++++++- 2 files changed, 21 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSBjYTVmMTUwZGExMWQ5Y2FhZTg2NjM4ODg1MTM3YW... | null | |
PYSEC-2021-230 | null | [
{
"commit_message": "[PATCH] Prevent division by 0 PiperOrigin-RevId: 370979352 Change-Id: Ic79191c316d986fc6072ecaebfec9d5f2b924d00 tensorflow/lite/kernels/batch_to_space_nd.cc | 1 + 1 file changed, 1 insertion(+)",
"patch_text_b64": "RnJvbSAyYzc0Njc0MzQ4YTQ3MDhjZWQ1OGFkNmViMWIyMzM1NGRmOGVlMDQ0IE1vbiBTZXAg... | null | |
GHSA-23g5-cwwr-8xhw | null | [
{
"commit_message": "[PATCH] ceph-volume: honour osd_dmcrypt_key_size option ceph-volume doesn't honour osd_dmcrypt_key_size. It means the default size is always applied. It also changes the default value in `get_key_size_from_conf()` From cryptsetup manpage: > For XTS mode you can optionally set a key size of ... | null | |
GHSA-gxh7-wv9q-fwfr | Electron's Content-Secrity-Policy disabling eval not applied consistently in renderers with sandbox disabled | null | [
{
"commit_message": "[PATCH] fix: blend node and blink code generation policy when both are loaded (#36567) patches/chromium/.patches | 1 + ...egenerationcheckcallbackinmainthread.patch | 38 ++++++++++++++++ patches/node/.patches | 1 + ...ol_codegenerationfromstring... | null |
CVE-2022-2564 | Prototype Pollution in automattic/mongoose | Prototype Pollution in GitHub repository automattic/mongoose prior to 6.4.6. | [
{
"commit_message": "[PATCH] fix(schema): disallow setting __proto__ when creating schema with dotted properties Fix #12085 lib/schema.js | 7 +++++++ test/schema.test.js | 10 ++++++++++ 2 files changed, 17 insertions(+)",
"patch_text_b64": "RnJvbSBhNDVjZmI2YjBjZTAwNjdhZTk3OTRjZmE4MGY3OTE3ZTFmYjNjNmY4... | CWE-1321 Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') |
CVE-2017-12988 | The telnet parser in tcpdump before 4.9.2 has a buffer over-read in print-telnet.c:telnet_parse(). | [
{
"commit_message": "[PATCH] CVE-2017-12988/TELNET: Add a missing bounds check. MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit This fixes a buffer over-read discovered by Forcepoint's security researchers Otto Airamo & Antti Levomäki. Add a test using the capture file ... | n/a | |
CVE-2012-0058 | The kiocb_batch_free function in fs/aio.c in the Linux kernel before 3.2.2 allows local users to cause a denial of service (OOPS) via vectors that trigger incorrect iocb management. | [
{
"commit_message": "[PATCH] Unused iocbs in a batch should not be accounted as active. commit 69e4747ee9727d660b88d7e1efe0f4afcb35db1b upstream. Since commit 080d676de095 (\"aio: allocate kiocbs in batches\") iocbs are allocated in a batch during processing of first iocbs. All iocbs in a batch are automatical... | n/a | |
GHSA-9p95-fxvg-qgq2 | simple-git vulnerable to Remote Code Execution when enabling the ext transport protocol | null | [
{
"commit_message": "[PATCH] Chore: bump lerna, jest and create prettier workflow (#862) * Chore: bump lerna to latest `6.0.3` * Chore: prettier and add lint action .changeset/poor-tools-doubt.md | 5 + .changeset/skip-hop-jump.md | 6 + .github/FUNDING.yml ... | null |
CVE-2018-10574 | site/index.php/admin/trees/add/ in BigTree 4.2.22 and earlier allows remote attackers to upload and execute arbitrary PHP code because the BigTreeStorage class in core/inc/bigtree/apis/storage.php does not prevent uploads of .htaccess files. | [
{
"commit_message": "[PATCH] Rejecting htaccess files: https://github.com/bigtreecms/BigTree-CMS/issues/335 core/inc/bigtree/apis/storage.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSA2MDliZDE3NzI4ZWUxZGIwNDg3YTQyZDk2MDI4ZDMwNTM3NTI4YWU4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAw... | n/a | |
CVE-2025-55205 | Capsule tenant owners with "patch namespace" permission can hijack system namespaces label | Capsule is a multi-tenancy and policy-based framework for Kubernetes. A namespace label injection vulnerability in Capsule v0.10.3 and earlier allows authenticated tenant users to inject arbitrary labels into system namespaces (kube-system, default, capsule-system), bypassing multi-tenant isolation and potentially accessing cross-tenant resources through TenantResource selectors. This vulnerability enables privilege escalation and violates the fundamental security boundaries that Capsule is designed to enforce. This vulnerability is fixed in 0.10.4. | [
{
"commit_message": "[PATCH] Merge commit from fork MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Signed-off-by: Oliver Bähler <oliverbaehler@hotmail.com> e2e/namespace_hijacking_test.go | 36 ++++++++++++++++++++++- pkg/webhook/namespace/validation/patch.go ... | CWE-863: Incorrect Authorization |
CVE-2021-36753 | sharkdp BAT before 0.18.2 executes less.exe from the current working directory. | [
{
"commit_message": "[PATCH] Fix for Windows: do not run binaries from CWD This fixes a bug on Windows where `Command::new` would also run executables from the current working directory, possibly resulting in accidental runs of programs called `less`. Cargo.lock | 29 +++++++++++++++++++++++++++++ Cargo.toml ... | n/a | |
GHSA-j26p-6wx7-f3pw | Youki: If /proc and /sys in the rootfs are symbolic links, they can potentially be exploited to gain access to the host root filesystem. | null | [
{
"commit_message": "[PATCH] Merge commit from fork Signed-off-by: Yusuke Sakurai <yusuke.sakurai@3-shake.com> crates/libcontainer/src/rootfs/mod.rs | 2 + crates/libcontainer/src/rootfs/mount.rs | 298 +++++++++++++++++- tests/contest/contest/src/main.rs | 3 + tests/contest/contest/... | null |
GHSA-7prf-vw4p-qr59 | Prototype pollution in supermixer | null | [
{
"commit_message": "[PATCH] Avoiding prototype pollution src/mixer.js | 3 +++ test/merge.js | 10 ++++++++++ 2 files changed, 13 insertions(+)",
"patch_text_b64": "RnJvbSA5NGRjYzZmYzQ1ZTBmZWQ5NjE4N2NiNTJhYWZmYWRmNzZkYmJjMGEzIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiB2YXN5bCA8dmFzeWxAZmxhc2gtZnguY29tLmF1Pg... | null |
GHSA-xp5g-whvx-3f7g | null | [
{
"commit_message": "[PATCH] add some boundary checks on gf_text_get_utf8_line (#1188) applications/mp4client/main.c | 2 +- src/media_tools/text_import.c | 77 +++++++++++++++++++++++------------ 2 files changed, 53 insertions(+), 26 deletions(-)",
"patch_text_b64": "RnJvbSAxYzQ0OWEzNGZlMGI1MGFhZmZiODgxYmZi... | null | |
CVE-2024-32034 | Cross-site scripting (XSS) in the decidim admin activity log | decidim is a Free Open-Source participatory democracy, citizen participation and open government for cities and organizations. The admin panel is subject to potential Cross-site scripting (XSS) attach in case an admin assigns a valuator to a proposal, or does any other action that generates an admin activity log where one of the resources has an XSS crafted. This issue has been addressed in release version 0.27.7, 0.28.2, and newer. Users are advised to upgrade. Users unable to upgrade may redirect the pages /admin and /admin/logs to other admin pages to prevent this access (i.e. `/admin/organization/edit`). | [
{
"commit_message": "[PATCH] Backport 'Refactor malformed titles in admin logs (part 2)' to v0.28 (#13083) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit * Refactor malformed titles in admin logs (part 2) * Refactor admin logs * Component presenters * Various logs * Mo... | CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
CVE-2023-0297 | Code Injection in pyload/pyload | Code Injection in GitHub repository pyload/pyload prior to 0.5.0b3.dev31. | [
{
"commit_message": "[PATCH] fix arbitrary python code execution by abusing js2py functionality src/pyload/core/utils/misc.py | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSA3ZDczYmE3OTE5ZTU5NGQ3ODNiMzQxMWQ3ZGRiODc4ODVhZWE3ODJkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBHYW... | CWE-94 Improper Control of Generation of Code |
CVE-2024-53848 | check-jsonschema default caching for remote schemas allows for cache confusion | check-jsonschema is a CLI and set of pre-commit hooks for jsonschema validation. The default cache strategy uses the basename of a remote schema as the name of the file in the cache, e.g. `https://example.org/schema.json` will be stored as `schema.json`. This naming allows for conflicts. If an attacker can get a user to run `check-jsonschema` against a malicious schema URL, e.g., `https://example.evil.org/schema.json`, they can insert their own schema into the cache and it will be picked up and used instead of the appropriate schema. Such a cache confusion attack could be used to allow data to pass validation which should have been rejected. This issue has been patched in version 0.30.0. All users are advised to upgrade. A few workarounds exist: 1. Users can use `--no-cache` to disable caching. 2. Users can use `--cache-filename` to select filenames for use in the cache, or to ensure that other usages do not overwrite the cached schema. (Note: this flag is being deprecated as part of the remediation effort.) 3. Users can explicitly download the schema before use as a local file, as in `curl -LOs https://example.org/schema.json; check-jsonschema --schemafile ./schema.json` | [
{
"commit_message": "[PATCH 1/2] Internal refactor: no default cache dirname The two cache dirs are currently \"refs\" and \"downloads\". Make these always explicit, rather than `\"downloads\"` being an internal default baked into the downloader. src/check_jsonschema/cachedownloader.py | 11 +++-------- s... | CWE-349: Acceptance of Extraneous Untrusted Data With Trusted Data |
GHSA-cwq6-mjmx-47p6 | XWiki's scheduler in subwiki allows scheduling operations for any main wiki user | null | [
{
"commit_message": "[PATCH] XWIKI-21663: Improve Scheduler access .../resources/ApplicationResources.properties | 1 + .../xwiki-platform-scheduler-ui/pom.xml | 21 +++ .../src/main/resources/Scheduler/WebHome.xml | 53 +++--- .../resources/Scheduler/WebPreferences.xml | 168 +----------------- .../x... | null |
GHSA-8x9g-h36m-4rg2 | null | [
{
"commit_message": "[PATCH] Fix #12372 and #12373 - Crash in x86 assembler (#12380) 0 ,0,[bP-bL-bP-bL-bL-r-bL-bP-bL-bL- mov ,0,[ax+Bx-ax+Bx-ax+ax+Bx-ax+Bx-- leA ,0,[bP-bL-bL-bP-bL-bP-bL-60@bL- leA ,0,[bP-bL-r-bP-bL-bP-bL-60@bL- mov ,0,[ax+Bx-ax+Bx-ax+ax+Bx-ax+Bx-- libr/asm/p/asm_x86_nz.c | 11 +++++++---- 1 fil... | null | |
GHSA-9pjf-jw9q-fx49 | Cross-site Scripting (XSS) in dolibarr/dolibarr | null | [
{
"commit_message": "[PATCH] Fix #hunter7a048bb7-bfdd-4299-931e-9bc283e92bc8 htdocs/main.inc.php | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSBmNTY5MDQ4ZWIyYmQ4MjM1MjViY2U0ZWY1MjMxNmU3YTgzZTMzNDVjIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBMYXVyZW50IERlc3RhaWxsZXVyIDxl... | null |
GHSA-x84j-v2j2-g9v8 | null | [
{
"commit_message": "[PATCH] fix: [security] XSS in workflow execution-path - As reported by Franck FERMAN app/View/Elements/Workflows/executionPath.ctp | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-)",
"patch_text_b64": "RnJvbSAxZjM5ZGViNTcyZGE3ZWNiNTg1NWUzMGZmM2NjOGNiY2FhMGMxMDU0IE1vbiBTZXAgMTc... | null | |
CVE-2024-38516 | Aimeos HTML client may potentially reveal sensitive information in error log | ai-client-html is an Aimeos e-commerce HTML client component. Debug information revealed sensitive information from environment variables in error log. This issue has been patched in versions 2024.04.7, 2023.10.15, 2022.10.13 and 2021.10.22. | [
{
"commit_message": "[PATCH] Don't log security relevant data to prevent revealing information src/Client/Html/Checkout/Confirm/Standard.php | 6 +----- 1 file changed, 1 insertion(+), 5 deletions(-)",
"patch_text_b64": "RnJvbSBiYjM4OTYyMGZmYzNjZjRhMmYyOWMxMWExZTVmNTEyMDQ5ZTBjMTMyIE1vbiBTZXAgMTcgMDA6MDA6MDAg... | CWE-1295: Debug Messages Revealing Unnecessary Information |
CVE-2025-59058 | httpsig-rs's HMAC verification is vulnerable to timing attack | httpsig-rs is a Rust implementation of IETF RFC 9421 http message signatures. Prior to version 0.0.19, the HMAC signature comparison is not timing-safe. This makes anyone who uses HS256 signature verification vulnerable to a timing attack that allows the attacker to forge a signature. Version 0.0.19 fixes the issue. | [
{
"commit_message": "[PATCH] security: make HS256 validation constant-time httpsig/src/crypto/symmetric.rs | 15 ++++++++------- 1 file changed, 8 insertions(+), 7 deletions(-)",
"patch_text_b64": "RnJvbSAzODFiYzY2MzMzZDNjY2Q3YWYyZDhiMTczYWZlZTNjNTIzZjI4ZGVjIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBPbGVrc2l... | CWE-208: Observable Timing Discrepancy |
GHSA-455w-c45v-86rg | fastify vulnerable to denial of service via malicious Content-Type | null | [
{
"commit_message": "[PATCH] Merge pull request from GHSA-455w-c45v-86rg * Add safeguard against malicious content types * Update lib/contentTypeParser.js Co-authored-by: Manuel Spigolon <behemoth89@gmail.com> * Apply spelling fixes from code review Co-authored-by: James Sumners <james@sumners.email> Co-authore... | null |
CVE-2015-8213 | The get_format function in utils/formats.py in Django before 1.7.x before 1.7.11, 1.8.x before 1.8.7, and 1.9.x before 1.9rc2 might allow remote attackers to obtain sensitive application secrets via a settings key in place of a date/time format setting, as demonstrated by SECRET_KEY. | [
{
"commit_message": "[PATCH] Fixed a settings leak possibility in the date template filter. This is a security fix. django/utils/formats.py | 20 ++++++++++++++++++++ docs/releases/1.7.11.txt | 15 ++++++++++++++- docs/releases/1.8.7.txt | 15 ++++++++++++++- tests/i18n/tests.py | 3 +++ 4 files changed, 51... | n/a | |
GHSA-74cr-77xc-8g6r | Prototype Pollution in @apollo/gateway | null | [
{
"commit_message": "[PATCH] Ignore __proto__ fields in deepMerge packages/apollo-gateway/src/utilities/deepMerge.ts | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSBjZWE3Mzk3NTgyYTI5M2FmNmE1ZjYwOTQ3ZGEzNGI5NWU2NjljNmMxIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBUcmV2b3IgU2NoZ... | null |
GHSA-6v3g-ccfx-69c7 | null | [
{
"commit_message": "[PATCH] Update requirements.txt requirements.txt | 1 + 1 file changed, 1 insertion(+)",
"patch_text_b64": "RnJvbSBiNDdlMTBiOTU0ODNhYTg0NThiNjRkMjMzNTA4NDRjMjllOTFjNDA4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBaaWppYW4gWmhhbmcgPGNrY3p6akBnbWFpbC5jb20+CkRhdGU6IFR1ZSwgMTggTm92IDIwMjUgMTE6... | null | |
GHSA-r48p-vhgj-x8mm | Unvalidated redirects | null | [
{
"commit_message": "[PATCH] [server/auth] ensure safe returnTo param components/server/src/user/user-controller.ts | 6 ++++++ 1 file changed, 6 insertions(+)",
"patch_text_b64": "RnJvbSA4Y2E0MzFmODZhZTNhNmY5YTE3YWZjZmVkNTFjZGQwNjVmY2ZmMWE1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBbGV4IFR1Z2FyZXYgPGFsZXgu... | null |
GHSA-34q3-p352-c7q8 | Central Dogma Authentication Bypass Vulnerability via Session Leakage | null | [
{
"commit_message": "[PATCH] Merge pull request from GHSA-34q3-p352-c7q8 Motivation: SAML `RelayState` is utilized to direct authenticated users to the correct resource. As it is inserted into the HTML document, proper HTML-escaping is crucial to prevent potential security risks, such as XSS attacks. [Reference... | null |
GHSA-864f-7xjm-2jp2 | CNCF K3s Kubernetes kubelet configuration exposes credentials | null | [
{
"commit_message": "[PATCH] Set kubelet read-only-port via CLI flag Signed-off-by: Brad Davidson <brad.davidson@rancher.com> pkg/daemons/agent/agent.go | 1 - pkg/daemons/agent/agent_linux.go | 3 +++ pkg/daemons/agent/agent_windows.go | 3 +++ 3 files changed, 6 insertions(+), 1 deletion(-)",
"patc... | null |
GHSA-rcjw-9639-853h | null | [
{
"commit_message": "[PATCH] oberthur: Correctly check for return values Thanks oss-fuzz https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28843 src/libopensc/pkcs15-oberthur.c | 13 +++++++------ 1 file changed, 7 insertions(+), 6 deletions(-)",
"patch_text_b64": "RnJvbSAxZGI4ODM3NGJiNzcwNmExMTVkNWMzNjE... | null | |
CVE-2013-7269 | The nr_recvmsg function in net/netrom/af_netrom.c in the Linux kernel before 3.12.4 updates a certain length value without ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call. | [
{
"commit_message": "[PATCH] net: rework recvmsg handler msg_name and msg_namelen logic This patch now always passes msg->msg_namelen as 0. recvmsg handlers must set msg_namelen to the proper size <= sizeof(struct sockaddr_storage) to return msg_name to the user. This prevents numerous uninitialized memory leak... | n/a | |
CVE-2023-40267 | GitPython before 3.1.32 does not block insecure non-multi options in clone and clone_from. NOTE: this issue exists because of an incomplete fix for CVE-2022-24439. | [
{
"commit_message": "[PATCH] Block insecure non-multi options in clone/clone_from Follow-up to #1521 git/repo/base.py | 2 ++ test/test_repo.py | 24 +++++++++++++++++++++++- 2 files changed, 25 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSA1YzU5ZTBkNjNkYTYxODBkYjhhMGIzNDlmMGFkMzZmZWY0MmFjZWVkIE1... | n/a | |
GHSA-m6g2-339q-45j8 | null | [
{
"commit_message": "[PATCH] pkp/pkp-lib#9322 Escape user group name in user list export classes/components/forms/statistics/users/ReportForm.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSAxOGIzMThmODMxMDVmZmE3ZmEyMTQxNzlmOGUyMDUwN2IwNzU0MjM2IE1vbiBTZXAgMTcgMDA6MDA6MDAg... | null | |
CVE-2025-26794 | Exim 4.98 before 4.98.1, when SQLite hints and ETRN serialization are used, allows remote SQL injection. (Resolving SQL injection requires an update to 4.99.1 in certain non-default rate-limit configurations.) | [
{
"commit_message": "[PATCH] update to exim-4.98.1, from Renaud Allard (maintainer) https://exim.org/static/doc/security/CVE-2025-26794.txt (sql injection, reachable if using the sqlite FLAVOR and if ETRN is enabled in config; default is disabled) mail/exim/Makefile | 4 +--- mail/exim/distinfo | 4 ++-- 2 files ... | CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') | |
CVE-2023-41053 | Redis SORT_RO may bypass ACL configuration | Redis is an in-memory database that persists on disk. Redis does not correctly identify keys accessed by `SORT_RO` and as a result may grant users executing this command access to keys that are not explicitly authorized by the ACL configuration. The problem exists in Redis 7.0 or newer and has been fixed in Redis 7.0.13 and 7.2.1. Users are advised to upgrade. There are no known workarounds for this vulnerability. | [
{
"commit_message": "[PATCH] Fix sort_ro get-keys function return wrong key number (#12522) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Before: ``` 127.0.0.1:6379> command getkeys sort_ro key (empty array) 127.0.0.1:6379> ``` After: ``` 127.0.0.1:6379> command getke... | CWE-269: Improper Privilege Management |
CVE-2024-47534 | Incorrect delegation lookups can make go-tuf download the wrong artifact | go-tuf is a Go implementation of The Update Framework (TUF). The go-tuf client inconsistently traces the delegations. For example, if targets delegate to "A", and to "B", and "B" delegates to "C", then the client should trace the delegations in the order "A" then "B" then "C" but it may incorrectly trace the delegations "B"->"C"->"A". This vulnerability is fixed in 2.0.1. | [
{
"commit_message": "[PATCH] Initial commit Signed-off-by: Radoslav Dimitrov <dimitrovr@vmware.com> NOTES.md | 10 + README.md | 72 ++++ examples/basic_repo.go | 462 ++++++++++++++++++++++++ examples/testdata/1.python-scripts.json | ... | CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') |
GHSA-wpfr-6297-9v57 | User object created with invalid provider data in GoTrue | null | [
{
"commit_message": "[PATCH] Handle failed status code in provider requests (#313) api/provider/provider.go | 19 +++++++++++++++ api/provider/provider_test.go | 44 +++++++++++++++++++++++++++++++++++ 2 files changed, 63 insertions(+) create mode 100644 api/provider/provider_test.go",
"patch_text_b64": ... | null |
CVE-2024-1163 | Path traversal vulnerability in mapshaper | The attacker may exploit a path traversal vulnerability leading to information disclosure. | [
{
"commit_message": "[PATCH] v0.6.44 CHANGELOG.md | 4 ++++ REFERENCE.md | 4 +++- bin/mapshaper-gui | 11 +++++++++-- package-lock.json | 4 ++-- package.json | 2 +- 5 files changed, 19 insertions(+), 6 deletions(-)",
"patch_text_b64": "RnJvbSA3NDM3ZDkwM2MwYTg3ODAyYzM3NTFmYzUyOWQyZGU3MDk4MDk... | CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') |
GHSA-jc7g-x28f-3v3h | listmonk's Sprig template Injection vulnerability leads to reading of Environment Variable for low privilege user | null | [
{
"commit_message": "[PATCH] Remove dangerous tpl funcs in Sprig that's enabled by default. `env` and `expandenv` template functions in the Sprig library allow accessing system environment variables within campaign templates. cmd/init.go | 6 +++++- internal/manager/manager.go | 6 +++++- 2 files ... | null |
CVE-2025-31490 | AutoGPT allows SSRF due to DNS Rebinding in requests wrapper | AutoGPT is a platform that allows users to create, deploy, and manage continuous artificial intelligence agents that automate complex workflows. Prior to 0.6.1, AutoGPT allows SSRF due to DNS Rebinding in requests wrapper. AutoGPT is built with a wrapper around Python's requests library, hardening the application against SSRF. The code for this wrapper can be found in autogpt_platform/backend/backend/util/request.py. The requested hostname of a URL which is being requested is validated, ensuring that it does not resolve to any local ipv4 or ipv6 addresses. However, this check is not sufficient, as a DNS server may initially respond with a non-blocked address, with a TTL of 0. This means that the initial resolution would appear as a non-blocked address. In this case, validate_url() will return the url as successful. After validate_url() has successfully returned the url, the url is then passed to the real request() function. When the real request() function is called with the validated url, request() will once again resolve the address of the hostname, because the record will not have been cached (due to TTL 0). This resolution may be in the "invalid range". This type of attack is called a "DNS Rebinding Attack". This vulnerability is fixed in 0.6.1. | [
{
"commit_message": "[PATCH] fix(backend): Increase block request security; Prevent DNS rebinding & open redirect attack (#9688) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit The current block web requests utility has a logic to avoid the system firing into blockliste... | CWE-918: Server-Side Request Forgery (SSRF) |
GHSA-j3rg-3rgm-537h | Directus vulnerable to Server-Side Request Forgery On File Import | null | [
{
"commit_message": "[PATCH] Cleanup request handler Squashed commit of the following: commit 90368698c81ed731c6d9be8b02bfa8ad1b5edd3f Author: rijkvanzanten <rijkvanzanten@me.com> Cleanup commit 61514f45096c22878527f4813fcb78d3b19e4687 Author: rijkvanzanten <rijkvanzanten@me.com> Rename to index commit 38fe6b84... | null |
CVE-2025-34174 | Netgate pfSense CE Status_Traffic_Totals Package v2.3.2_7 Stored Cross-Site Scripting | In pfSense CE /usr/local/www/status_traffic_totals.php, the value of the start-day parameter is not ensured to be a numeric value or sanitized of HTML-related characters/strings before being directly displayed in the input box. This value can be saved as the default value to be displayed to all users when visiting the Status Traffic Totals page, resulting in stored cross-site scripting. The attacker must be authenticated with at least "WebCfg - Status: Traffic Totals" permissions. | [
{
"commit_message": "[PATCH] Status_Traffic_Totals input validation. Fixes #16413 .../Makefile | 3 +- .../usr/local/www/status_traffic_totals.php | 80 ++++++++++++++----- 2 files changed, 62 insertions(+), 21 deletions(-)",
"patch_text_b64": "RnJvbSA5ZTQxMmVkZjYyMTEzMzAzY... | CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') |
CVE-2019-15149 | core.py in Mitogen before 0.2.8 has a typo that drops the unidirectional-routing protection mechanism in the case of a child that is initiated by another child. The Ansible extension is unaffected. NOTE: the vendor disputes this issue because it is exploitable only in conjunction with hypothetical other factors, i.e., an affected use case within a library caller, and a bug in the message receiver policy code that led to reliance on this extra protection mechanism | [
{
"commit_message": "[PATCH] [security] core: undirectional routing wasn't respected in some cases When creating a context using Router.method(via=somechild), unidirectional mode was set on the new child correctly, however if the child were to call Router.method(), due to a typing mistake the new child would st... | n/a | |
CVE-2016-4979 | The Apache HTTP Server 2.4.18 through 2.4.20, when mod_http2 and mod_ssl are enabled, does not properly recognize the "SSLVerifyClient require" directive for HTTP/2 request authorization, which allows remote attackers to bypass intended access restrictions by leveraging the ability to send multiple requests over a single connection and aborting a renegotiation. | [
{
"commit_message": "[PATCH] modssl: reset client-verify state when renegotiation is aborted git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1750779 13f79535-47bb-0310-9956-ffa450edef68 CHANGES | 3 +++ modules/ssl/ssl_engine_kernel.c | 1 + 2 files changed, 4 insertions(+)"... | n/a | |
CVE-2024-35366 | FFmpeg n6.1.1 is Integer Overflow. The vulnerability exists in the parse_options function of sbgdec.c within the libavformat module. When parsing certain options, the software does not adequately validate the input. This allows for negative duration values to be accepted without proper bounds checking. | [
{
"commit_message": "[PATCH] avformat/sbgdec: Check for negative duration Fixes: signed integer overflow: 9223372036854775807 - -8000000 cannot be represented in type 'long' Fixes: 62276/clusterfuzz-testcase-minimized-ffmpeg_dem_SBG_fuzzer-5133181743136768 Found-by: continuous fuzzing process https://github.com... | n/a | |
CVE-2024-47604 | XSS vulnerability in NuGetGallery HTML attributes handling | NuGet Gallery is a package repository that powers nuget.org. The NuGetGallery has a security vulnerability in its handling of HTML element attributes, which allows an attacker to execute arbitrary HTML or Javascript code in a victim's browser. | [
{
"commit_message": "[PATCH] Fix for issues with root page styling (#10193) We only have [custom styles](https://github.com/NuGet/NuGetGallery/blob/f1434e76555bf7c8f8b29b0e9a7d08f1f1b76982/src/Bootstrap/less/theme/base.less#L624-L636) for when `id=\"/\"`, no need to have it specified in any other case. Also fix... | CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
CVE-2017-18241 | fs/f2fs/segment.c in the Linux kernel before 4.13 allows local users to cause a denial of service (NULL pointer dereference and panic) by using a noflush_merge option that triggers a NULL value for a flush_cmd_control data structure. | [
{
"commit_message": "[PATCH] f2fs: fix a panic caused by NULL flush_cmd_control Mount fs with option noflush_merge, boot failed for illegal address fcc in function f2fs_issue_flush: if (!test_opt(sbi, FLUSH_MERGE)) { ret = submit_flush_wait(sbi); atomic_inc(&fcc->issued_flush); -> Here, fcc illegal return re... | n/a | |
CVE-2021-21250 | Post-Auth External Entity Expansion (XXE) | OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, there is a critical vulnerability which may lead to arbitrary file read. When BuildSpec is provided in XML format, the spec is processed by XmlBuildSpecMigrator.migrate(buildSpecString); which processes the XML document without preventing the expansion of external entities. These entities can be configured to read arbitrary files from the file system and dump their contents in the final XML document to be migrated. If the files are dumped in properties included in the YAML file, it will be possible for an attacker to read them. If not, it is possible for an attacker to exfiltrate the contents of these files Out Of Band. This issue was addressed in 4.0.3 by ignoring ENTITY instructions in xml file. | [
{
"commit_message": "[PATCH] Fix XXE injection attack by disabling XML DTD handling .../io/onedev/server/migration/XmlBuildSpecMigrator.java | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSA5MTk2ZmQ3OTVlODdkYWIwNjliNDI2MGEzNTkwYTBlYTg4NmU3NzBmIE1vbiBTZXAgMTcgMDA6MDA6... | CWE-538 File and Directory Information Exposure |
GHSA-275c-w5mq-v5m2 | PaddlePaddle floating point exception in paddle.argmin and paddle.argmax | null | [
{
"commit_message": "[PATCH] add arg check for argmin and argmax (#59976) paddle/phi/kernels/cpu/arg_min_max_kernel.cc | 5 +++++ paddle/phi/kernels/gpu/arg_min_max_kernel.cu | 5 +++++ paddle/phi/kernels/xpu/arg_min_max_kernel.cc | 5 +++++ 3 files changed, 15 insertions(+)",
"patch_text_b64": "RnJvbSA2ZWY3MT... | null |
CVE-2022-39269 | Media transport downgrade from the secure version (SRTP) to non-secure (RTP) in pjsip | PJSIP is a free and open source multimedia communication library written in C. When processing certain packets, PJSIP may incorrectly switch from using SRTP media transport to using basic RTP upon SRTP restart, causing the media to be sent insecurely. The vulnerability impacts all PJSIP users that use SRTP. The patch is available as commit d2acb9a in the master branch of the project and will be included in version 2.13. Users are advised to manually patch or to upgrade. There are no known workarounds for this vulnerability. | [
{
"commit_message": "[PATCH] Merge pull request from GHSA-wx5m-cj97-4wwg pjmedia/src/pjmedia/transport_srtp.c | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSBkMmFjYjlhZjRlMjdiNWJhNzVkNjU4NjkwNDA2Y2VjOWMyNzRjNWNjIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBSaXphIFN1bGlzdHl... | CWE-319: Cleartext Transmission of Sensitive Information |
CVE-2020-11735 | The private-key operations in ecc.c in wolfSSL before 4.4.0 do not use a constant-time modular inverse when mapping to affine coordinates, aka a "projective coordinates leak." | [
{
"commit_message": "[PATCH] Constant time EC map to affine for private operations For fast math, use a constant time modular inverse when mapping to affine when operation involves a private key - key gen, calc shared secret, sign. wolfcrypt/src/ecc.c | 54 ++++++++++++++++++++++++----- wolfcrypt/src/tfm.c ... | n/a | |
GHSA-pcx2-r23v-3j7c | null | [
{
"commit_message": "[PATCH] kernel: harden the signature check (#1027) kernel/Makefile | 4 +- kernel/apk_sign.c | 198 +++++++++++++++++++++++---------- kernel/apk_sign.h | 5 +- kernel/manager.c | 2 +- scripts/check_v2.c | 174 ------------... | null | |
GHSA-grgm-pph5-j5h7 | Exposure of Sensitive Information to an Unauthorized Actor in ansible | null | [
{
"commit_message": "[PATCH] safe_eval fix (#57188) * just dont pass locals - also fix globals - added tests * fixed tests (cherry picked from commit b9b0b230150eceb442c34c917d9e852d5e8b7371) changelogs/fragments/fix_safe_eval.yml | 2 + lib/ansible/template/__init__.py | 2 +- lib/ansible/t... | null |
GHSA-hhq7-jf2p-hw9c | Moodle multiple cross-site request forgery (CSRF) vulnerabilities | null | [
{
"commit_message": "[PATCH] MDL-48106 mod_glossary: Add missing sesskey checks mod/glossary/editcategories.html | 1 + mod/glossary/editcategories.php | 4 ++++ 2 files changed, 5 insertions(+)",
"patch_text_b64": "RnJvbSA1NzcwZTUxNDc4MzhhYTA2YTNlY2RmZjZmYzNhZWJiYmQxN2ZmZjkwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwM... | null |
GHSA-w5rh-j4g3-jr29 | Missing Authorization in Jenkins S3 publisher Plugin | null | [
{
"commit_message": "[PATCH] [SECURITY-2201] .../java/hudson/plugins/s3/S3BucketPublisher.java | 13 +++++++++++-- 1 file changed, 11 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSAyZTg1ZTQ1YzBlNGU3YTkyMzFiMDMxNzM5MjkyOGUyZDE5ZTc3MzY4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBZHJpZW4gTGVjaGFycG... | null |
CVE-2025-5700 | Simple Logo Carousel <= 1.9.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via id Parameter | The Simple Logo Carousel plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘id’ parameter in all versions up to, and including, 1.9.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [
{
"commit_message": "[PATCH] fixed wordfence vulnurbility for Id attribute includes/Base/Shortcode.php | 11 +++++++---- 1 file changed, 7 insertions(+), 4 deletions(-)",
"patch_text_b64": "RnJvbSBkOTk1YjVkMzVlMGZkYzBhNTkzMDdjZTY2NGU0Y2UxMTU4YjY5YmZmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBzdW5qYXZhMTEgPHN... | CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
CVE-2023-48299 | TorchServe ZipSlip | TorchServe is a tool for serving and scaling PyTorch models in production. Starting in version 0.1.0 and prior to version 0.9.0, using the model/workflow management API, there is a chance of uploading potentially harmful archives that contain files that are extracted to any location on the filesystem that is within the process permissions. Leveraging this issue could aid third-party actors in hiding harmful code in open-source/public models, which can be downloaded from the internet, and take advantage of machines running Torchserve. The ZipSlip issue in TorchServe has been fixed by validating the paths of files contained within a zip archive before extracting them. TorchServe release 0.9.0 includes fixes to address the ZipSlip vulnerability. | [
{
"commit_message": "[PATCH] fix zip slip error (#2634) .../pytorch/serve/archive/utils/ZipUtils.java | 19 +++++++++++++++++-- 1 file changed, 17 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSBiZmIzZDQyMzk2NzI3NjE0YWVmNjI1MTQzYjQzODFlNjQxNDJmOWJiIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBNYXJrIFN... | CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') |
CVE-2025-54956 | The gh package before 1.5.0 for R delivers an HTTP response in a data structure that includes the Authorization header from the corresponding HTTP request. | [
{
"commit_message": "[PATCH] Do not save request headers in the return value Closes #222. .vscode/settings.json | 3 ++- DESCRIPTION | 2 +- NEWS.md | 27 +++++++++++++++++++++++---- R/gh.R | 2 +- R/gh_response.R ... | CWE-669 Incorrect Resource Transfer Between Spheres | |
GHSA-m6pr-xcrm-4qqp | XSS in Ignite Realtime Openfire via isTrustStore | null | [
{
"commit_message": "[PATCH] Fix issues identified by CSW (#1561) .../jivesoftware/admin/servlet/SystemCacheDetailsServlet.java | 2 +- xmppserver/src/main/webapp/import-truststore-certificate.jsp | 2 +- xmppserver/src/main/webapp/security-certificate-details.jsp | 2 +- xmppserver/src/main/webapp/system-ca... | null |
CVE-2018-1128 | It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network can use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable. | [
{
"commit_message": "[PATCH] auth/cephx: add authorizer challenge Allow the accepting side of a connection to reject an initial authorizer with a random challenge. The connecting side then has to respond with an updated authorizer proving they are able to decrypt the service's challenge and that the new author... | CWE-294 | |
CVE-2024-0006 | DB User Password Leak in Application Log | Information exposure in the logging system in Yugabyte Platform allows local attackers with access to application logs to obtain database user credentials in log files, potentially leading to unauthorized database access. | [
{
"commit_message": "[PATCH] [BACKPORT 2.18][PLAT-14286] Potential Security Issue: Password Leak in Application Log Summary: Original diff - https://phorge.dev.yugabyte.com/D35975 (553e70deb02f16ac9546ebd47f4651663b593088) This is more of a point fix because the node-agent java client changes are not present in... | CWE-532 Insertion of Sensitive Information into Log File |
GHSA-7r96-8g3x-g36m | Improper Verification of Cryptographic Signature | null | [
{
"commit_message": "[PATCH] Critical security fix in verifyWithMessage node/tenvoy.js | 2 +- tenvoy.js | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSBhMTIxYjM0YTQ1ZTI4OWQ3NzVjNjJlNTg4NDE1MjI4OTFkZWU2ODZiIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBDTUVPTkUgPGNvbnRhY3... | null |
CVE-2021-32672 | Vulnerability in Lua Debugger in Redis | Redis is an open source, in-memory database that persists on disk. When using the Redis Lua Debugger, users can send malformed requests that cause the debugger’s protocol parser to read data beyond the actual buffer. This issue affects all versions of Redis with Lua debugging support (3.2 or newer). The problem is fixed in versions 6.2.6, 6.0.16 and 5.0.14. | [
{
"commit_message": "[PATCH] Fix protocol parsing on 'ldbReplParseCommand' (CVE-2021-32672) The protocol parsing on 'ldbReplParseCommand' (LUA debugging) Assumed protocol correctness. This means that if the following is given: *1 $100 test The parser will try to read additional 94 unallocated bytes after the cl... | CWE-125: Out-of-bounds Read |
CVE-2021-32803 | Arbitrary File Creation/Overwrite via insufficient symlink protection due to directory cache poisoning | The npm package "tar" (aka node-tar) before versions 6.1.2, 5.0.7, 4.4.15, and 3.2.3 has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary `stat` calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory. This order of operations resulted in the directory being created and added to the `node-tar` directory cache. When a directory is present in the directory cache, subsequent calls to mkdir for that directory are skipped. However, this is also where `node-tar` checks for symlinks occur. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass `node-tar` symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.3, 4.4.15, 5.0.7 and 6.1.2. | [
{
"commit_message": "[PATCH] Remove paths from dirCache when no longer dirs lib/unpack.js | 22 +++++++++++++++++++++ test/unpack.js | 53 ++++++++++++++++++++++++++++++++++++++++++++++++++ 2 files changed, 75 insertions(+)",
"patch_text_b64": "RnJvbSA5ZGJkZWI2ZGY4ZTlkYmQ5NmZhOWU4NDM0MWI5ZDc0NzM0YmU2YzIwIE1v... | CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') |
CVE-2021-21433 | Remote code execution on discord-recon .dirsearch and .arjun commands due to improper input validation | Discord Recon Server is a bot that allows you to do your reconnaissance process from your Discord. Remote code execution in version 0.0.1 would allow remote users to execute commands on the server resulting in serious issues. This flaw is patched in 0.0.2. | [
{
"commit_message": "[PATCH] Fixing Command Injection Issues. app.py | 8 ++++++++ 1 file changed, 8 insertions(+)",
"patch_text_b64": "RnJvbSAyNmUyYTA4NDY3OTY3OWNjY2RlZWFiYmI2ODg5Y2UxMjBlZmY3ZTUwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBNb2hhbWVkIERpZWYgPG1kYWlmMTMzMkBnbWFpbC5jb20+CkRhdGU6IFRodSwgMjUgRmViI... | CWE-94 Improper Control of Generation of Code ('Code Injection') |
GHSA-vrv9-3x3w-ffxw | node-red-dashboard vulnerable to Cross-site Scripting | null | [
{
"commit_message": "[PATCH] Fix ui_text XSS to close #772 CHANGELOG.md | 4 ++ dist/dashboard.appcache | 4 +- dist/js/app.min.js | 4 +- package.json | 2 +- .../ui-component/ui-component-ctrl.js... | null |
CVE-2021-39212 | Issue when Configuring the ImageMagick Security Policy | ImageMagick is free software delivered as a ready-to-run binary distribution or as source code that you may use, copy, modify, and distribute in both open and proprietary applications. In affected versions and in certain cases, Postscript files could be read and written when specifically excluded by a `module` policy in `policy.xml`. ex. <policy domain="module" rights="none" pattern="PS" />. The issue has been resolved in ImageMagick 7.1.0-7 and in 6.9.12-22. Fortunately, in the wild, few users utilize the `module` policy and instead use the `coder` policy that is also our workaround recommendation: <policy domain="coder" rights="none" pattern="{PS,EPI,EPS,EPSF,EPSI}" />. | [
{
"commit_message": "[PATCH] Use the correct rights. MagickCore/module.c | 2 +- MagickCore/static.c | 8 ++++++-- 2 files changed, 7 insertions(+), 3 deletions(-)",
"patch_text_b64": "RnJvbSAwMWZhZGRiZTI3MTFhNDE1NjE4MGM0YTkyODM3ZTJmMjM2ODNjYzY4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBEaXJrIExlbXN0cmEgPGRpc... | CWE-668: Exposure of Resource to Wrong Sphere |
GHSA-hjq3-qcx4-mc3m | null | [
{
"commit_message": "[PATCH] avcodec/dsputil: fix signedness in sizeof() comparissions Signed-off-by: Michael Niedermayer <michaelni@gmx.at> libavcodec/dsputil.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSA0NTRhMTFhMWM5YzY4NmM3OGFhOTc5NTQzMDZmYjYzNDUzMjk5NzYwIE1vbiBT... | null | |
GHSA-v427-c49j-8w6x | Cleartext Storage of Sensitive Information in HMAC SHA256 Authentication | null | [
{
"commit_message": "[PATCH 01/33] Initial update to encrypt secretKey .../Authenticators/HmacSha256.php | 17 ++++++++- src/Config/AuthToken.php | 36 +++++++++++++++++++ src/Models/UserIdentityModel.php | 25 +++++++++++-- .../Authenticators/HmacAuthenticatorTest.php... | null |
CVE-2023-45130 | Frontier opcode SUICIDE touches too many storage values on large contracts | Frontier is Substrate's Ethereum compatibility layer. Prior to commit aea528198b3b226e0d20cce878551fd4c0e3d5d0, at the end of a contract execution, when opcode SUICIDE marks a contract to be deleted, the software uses `storage::remove_prefix` (now renamed to `storage::clear_prefix`) to remove all storages associated with it. This is a single IO primitive call passing the WebAssembly boundary. For large contracts, the call (without providing a `limit` parameter) can be slow. In addition, for parachains, all storages to be deleted will be part of the PoV, which easily exceed relay chain PoV size limit. On the other hand, Frontier's maintainers only charge a fixed cost for opcode SUICIDE. The maintainers consider the severity of this issue high, because an attacker can craft a contract with a lot of storage values on a parachain, and then call opcode SUICIDE on the contract. If the transaction makes into a parachain block, the parachain will then stall because the PoV size will exceed relay chain's limit. This is especially an issue for XCM transactions, because they can't be skipped. Commit aea528198b3b226e0d20cce878551fd4c0e3d5d0 contains a patch for this issue. For parachains, it's recommended to issue an emergency runtime upgrade as soon as possible. For standalone chains, the impact is less severe because the issue mainly affects PoV sizes. It's recommended to issue a normal runtime upgrade as soon as possible. There are no known workarounds. | [
{
"commit_message": "[PATCH] Initial support for asynchronous suiciding (#1212) * Initial support for asynchronous suiciding * Use contains_key instead of is_some Co-authored-by: Xiliang Chen <xlchen1291@gmail.com> * Fix compile * Remove unnecessary Suicided check * Don't call dec_sufficients * Handle pre-EIP16... | CWE-770: Allocation of Resources Without Limits or Throttling |
CVE-2021-4110 | NULL Pointer Dereference in mruby/mruby | mruby is vulnerable to NULL Pointer Dereference | [
{
"commit_message": "[PATCH] proc.c: add `mrb_state` argument to `mrb_proc_copy()`. The function may invoke the garbage collection and it requires `mrb_state` to run. include/mruby/proc.h | 2 +- src/class.c | 2 +- src/proc.c | 12 ++++++------ 3 files changed, 8 insertions(+), 8 deletions(-)... | CWE-476 NULL Pointer Dereference |
GHSA-fgxc-mxvw-55mv | Jenkins Git Parameter Plugin vulnerable to stored cross-site scripting (XSS) | null | [
{
"commit_message": "[PATCH] [SECURITY-1709] .../plugins/gitparameter/GitParameterDefinition.java | 2 +- .../gitparameter/GitParameterDefinition/index.jelly | 8 +++----- .../plugins/gitparameter/javascript/git-parameter.js | 10 +++++----- 3 files changed, 9 insertions(+), 11 deletions(-)",
"patch_t... | null |
GHSA-2xv9-ghh9-xc69 | radashi Allows Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | null | [
{
"commit_message": "[PATCH] fix(set): prevent prototype pollution src/mod.ts | 1 + src/object/isDangerousKey.ts | 17 +++++++++++++++++ src/object/set.ts | 6 +++++- tests/object/set.test.ts | 33 ++++++++++++++++++++++++++++----- 4 files changed, 51 insertions(+), 6 deletions(-... | null |
GHSA-mhjc-hmmf-jc58 | null | [
{
"commit_message": "[PATCH] remove strncpy usage as it's effectively useless, replace with an assertion since fn is only used internally (fix #1426) src/jslex.c | 27 ++++++++++++++------------- 1 file changed, 14 insertions(+), 13 deletions(-)",
"patch_text_b64": "RnJvbSBiZWQ4NDRmMTA5YjZjMjIyODE2NzQwNTU1MD... | null | |
CVE-2014-9714 | Cross-site scripting (XSS) vulnerability in the WddxPacket::recursiveAddVar function in HHVM (aka the HipHop Virtual Machine) before 3.5.0 allows remote attackers to inject arbitrary web script or HTML via a crafted string to the wddx_serialize_value function. | [
{
"commit_message": "[PATCH] HTMLEncode strings in wddx_serialize_value() Summary: Strings returned through wddx_serialize_value should be HTMLEncode()'d during serialization. Fixes #4283 {sync, type=\"child\", parent=\"internal\", parentrevid=\"1691695\", parentrevfbid=\"1537976659780590\", parentdiffid=\"5726... | n/a | |
CVE-2024-53930 | WikiDocs before 1.0.65 allows stored XSS by authenticated users via data that comes after $$\\, which is mishandled by a KaTeX parser. | [
{
"commit_message": "[PATCH] adds multiple security features #211 - adds security headers - adds better session cookies - adds session id regeneration to prevent fixation attacks - restricts katex options to prevent cross-site scripting attacks - adds SecurityFilters class to sanitize katex formulas bootstrap.i... | n/a | |
GHSA-3rh7-494q-3mjq | null | [
{
"commit_message": "[PATCH] Fix UAF in comps_objmrtree_unite function The added field is not used at all in many places and it is probably the left-over of some copy-paste. libcomps/src/comps_mradix.c | 2 -- libcomps/src/comps_objmradix.c | 2 -- libcomps/src/comps_objradix.c | 2 -- libcomps/src/comps_radix... | null | |
GHSA-6363-v5m4-fvq3 | timber/timber vulnerable to Deserialization of Untrusted Data | null | [
{
"commit_message": "[PATCH] fix: Add patch for PHAR deserialization vulnerability for Timber 2.x (security advisory GHSA-6363-v5m4-fvq3) Co-authored-by: Lukas Gaechter <lukas.gaechter@mind.ch> src/Attachment.php | 5 +++ src/Image/Operation/ToJpg.php | 5 +++ src/Image/Operation/ToWebp.php | 5 ++... | null |
CVE-2025-68953 | Certain Frappe requests are vulnerable to Path Traversal | Frappe is a full-stack web application framework. Versions 14.99.5 and below and 15.0.0 through 15.80.1 include requests that are vulnerable to path traversal attacks. Arbitrary files from the server could be retrieved due to a lack of proper sanitization on some requests. This issue is fixed in versions 14.99.6 and 15.88.1. To workaround, changing the setup to use a reverse proxy is recommended. | [
{
"commit_message": "[PATCH] fix(middleware): check path before returning file Signed-off-by: Akhil Narang <me@akhilnarang.dev> frappe/middlewares.py | 13 +++++++------ 1 file changed, 7 insertions(+), 6 deletions(-)",
"patch_text_b64": "RnJvbSAzODY3ZmIxMTJjM2Y3YmUxYTg2M2U0MGYxOWU5MjM1NzE5Zjc4NGZiIE1vbiBTZX... | CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') |
GHSA-c2v4-chx5-vff6 | Duplicate Advisory: Integer overflow in cmark-gfm table parsing extension leads to heap memory corruption | null | [
{
"commit_message": "[PATCH 1/2] Update cmark-upstream to https://github.com/github/cmark-gfm/commit/ff164f188bc1eb23391c85436ab418463e7a030f ext/commonmarker/cmark-gfm_version.h | 4 ++-- ext/commonmarker/cmark-upstream | 2 +- ext/commonmarker/table.c | 30 ++++++++++++++++++++++++++-- 3 files... | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.