id
stringlengths
12
19
title
stringlengths
0
237
description
stringlengths
35
3.87k
patches
listlengths
1
22
cwe
stringlengths
2
440
GHSA-v8xr-mc49-hfww
null
[ { "commit_message": "[PATCH] scsi: megaraid_sas: return error when create DMA pool failed when create DMA pool for cmd frames failed, we should return -ENOMEM, instead of 0. In some case in: megasas_init_adapter_fusion() -->megasas_alloc_cmds() -->megasas_create_frame_pool create DMA pool failed, --> megasas_fr...
null
CVE-2014-3153
The futex_requeue function in kernel/futex.c in the Linux kernel through 3.14.5 does not ensure that calls have two different futex addresses, which allows local users to gain privileges via a crafted FUTEX_REQUEUE command that facilitates unsafe waiter modification.
[ { "commit_message": "[PATCH] futex-prevent-requeue-pi-on-same-futex.patch futex: Forbid uaddr == uaddr2 in futex_requeue(..., requeue_pi=1) If uaddr == uaddr2, then we have broken the rule of only requeueing from a non-pi futex to a pi futex with this call. If we attempt this, then dangling pointers may be lef...
n/a
GHSA-839c-8x38-qf59
null
[ { "commit_message": "[PATCH] adapter: Fix storing discoverable setting discoverable setting shall only be store when changed via Discoverable property and not when discovery client set it as that be considered temporary just for the lifetime of the discovery. src/adapter.c | 35 ++++++++++++++++++++++-----------...
null
CVE-2016-0723
Race condition in the tty_ioctl function in drivers/tty/tty_io.c in the Linux kernel through 4.4.1 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free and system crash) by making a TIOCGETD ioctl call during processing of a TIOCSETD ioctl call.
[ { "commit_message": "[PATCH] tty: Fix unsafe ldisc reference via ioctl(TIOCGETD) ioctl(TIOCGETD) retrieves the line discipline id directly from the ldisc because the line discipline id (c_line) in termios is untrustworthy; userspace may have set termios via ioctl(TCSETS*) without actually changing the line disc...
n/a
CVE-2017-9364
Unrestricted File Upload exists in BigTree CMS through 4.2.18: if an attacker uploads an 'xxx.pht' or 'xxx.phtml' file, they could bypass a safety check and execute any code.
[ { "commit_message": "[PATCH] Disabling phtml/pht files from being uploaded. https://github.com/bigtreecms/BigTree-CMS/issues/280 core/inc/bigtree/apis/storage.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBiNzIyOTM5NDY5NTFjYzY1MGVhZjUxZjVkMmY2MmNlYWM2MzM1ZTEyIE1vbiBTZXA...
n/a
GHSA-xqxm-2rpm-3889
Comment reply notifications sent to incorrect users
null
[ { "commit_message": "[PATCH] Fix commenting thread notifications being sent to non-thread users wagtail/admin/tests/pages/test_edit_page.py | 22 +++++++++++++++++++++ wagtail/admin/views/pages/edit.py | 6 +++--- 2 files changed, 25 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSA1ZmU5MD...
null
GHSA-q8gg-vj6m-hgmj
@braintree/sanitize-url Cross-site Scripting vulnerability
null
[ { "commit_message": "[PATCH] Fix html entity tab (#45) * fix: correct urls that did not sanitize html encoded colons * fix: replace html encoded tabs * update CHANGELOG.md Co-authored-by: Blade Barringer <blade.barringer@paypal.com> CHANGELOG.md | 5 +++++ src/__tests__/test.ts | 10 ++++++++++ src/inde...
null
CVE-2022-47941
An issue was discovered in ksmbd in the Linux kernel 5.15 through 5.19 before 5.19.2. fs/ksmbd/smb2pdu.c omits a kfree call in certain smb2_handle_negotiate error conditions, aka a memory leak.
[ { "commit_message": "[PATCH] ksmbd: fix memory leak in smb2_handle_negotiate The allocated memory didn't free under an error path in smb2_handle_negotiate(). Fixes: e2f34481b24d (\"cifsd: add server-side procedures for SMB3\") Cc: stable@vger.kernel.org Reported-by: zdi-disclosures@trendmicro.com # ZDI-CAN-1781...
n/a
GHSA-vfm5-rmrh-j26v
Possible Content Security Policy bypass in Action Dispatch
null
[ { "commit_message": "[PATCH] Add CSP directive validation Validate directives to make sure they don't include semicolons or whitespace. These are special and denote lists and termination of directives. [CVE-2024-54133] actionpack/CHANGELOG.md | 8 ++++++ .../http/content_security_policy.rb...
null
CVE-2019-20042
In wp-includes/formatting.php in WordPress 3.7 to 5.3.0, the function wp_targeted_link_rel() can be used in a particular way to result in a stored cross-site scripting (XSS) vulnerability. This has been patched in WordPress 5.3.1, along with all the previous WordPress versions from 3.7 to 5.3 via a minor release.
[ { "commit_message": "[PATCH] Prevent stored XSS through wp_targeted_link_rel(). Brings r46894 to the 5.3 branch. Props: vortfu, whyisjake, peterwilsoncc, xknown, SergeyBiryukov, flaviozavan. git-svn-id: https://develop.svn.wordpress.org/branches/5.3@46898 602fd350-edb4-49c9-b593-d223f7449a82 src/wp-includes/f...
n/a
CVE-2023-5289
Allocation of Resources Without Limits or Throttling in ikus060/rdiffweb
Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffweb prior to 2.8.4.
[ { "commit_message": "[PATCH] Add ratelimit to AccessToken, SSH Keys, User creation rdiffweb/controller/page_admin_users.py | 10 ++++------ rdiffweb/controller/page_pref_sshkeys.py | 1 + rdiffweb/controller/page_pref_tokens.py | 1 + 3 files changed, 6 insertions(+), 6 deletions(-)", "patch_text_b64": "Rn...
CWE-770 Allocation of Resources Without Limits or Throttling
GHSA-f7f6-9jq7-3rqj
estree-util-value-to-estree allows prototype pollution in generated ESTree
null
[ { "commit_message": "[PATCH] Fix __proto__ property emit MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit The `__proto__` property is a special use case. It can be defined as a computed property in an object expression, or via `defineProperty`. If it’s assigned via a non...
null
GHSA-vwg4-846x-f94v
usememos/memos vulnerable to improper authorization
null
[ { "commit_message": "[PATCH] fix: disable decode patch id (#831) api/memo.go | 2 +- api/resource.go | 2 +- api/shortcut.go | 2 +- api/user.go | 2 +- 4 files changed, 4 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSBkY2EzNWJkZTg3N2FhYjZlNjRlZjUxYjUyZTU5MGI1ZDQ4ZjY5MmY5IE1vbiBTZXAgMTcgMDA6M...
null
GHSA-79rq-pp6p-6hmr
null
[ { "commit_message": "[PATCH] fixed #1783 (fuzz) src/isomedia/isom_intern.c | 1 + 1 file changed, 1 insertion(+)", "patch_text_b64": "RnJvbSBmZTUxNTVjZjA0NzI1MmQxYzRjYjkxNjAyMDQ4YmZhNjgyYWYwZWE3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBqZWFubGYgPGplYW5sZkBncGFjLmlvPgpEYXRlOiBNb24sIDEwIE1heSAyMDIxIDExOjE4OjU...
null
GHSA-rp8h-vr48-4j8p
Apache Tomcat Exposes IP Addresses and HTTP Headers of Requests
null
[ { "commit_message": "[PATCH] Fix https://issues.apache.org/bugzilla/show_bug.cgi?id=51872 Ensure access log always logs the correct remote IP. Ensure requests with multiple errors do not result in multiple access log entries. git-svn-id: https://svn.apache.org/repos/asf/tomcat/tc7.0.x/trunk@1176592 13f79535-47b...
null
CVE-2020-15197
Denial of Service in Tensorflow
In Tensorflow before version 2.3.1, the `SparseCountSparseOutput` implementation does not validate that the input arguments form a valid sparse tensor. In particular, there is no validation that the `indices` tensor has rank 2. This tensor must be a matrix because code assumes its elements are accessed as elements of a matrix. However, malicious users can pass in tensors of different rank, resulting in a `CHECK` assertion failure and a crash. This can be used to cause denial of service in serving installations, if users are allowed to control the components of the input sparse tensor. The issue is patched in commit 3cbb917b4714766030b28eba9fb41bb97ce9ee02 and is released in TensorFlow version 2.3.1.
[ { "commit_message": "[PATCH] Fix multiple vulnerabilities in `tf.raw_ops.*CountSparseOutput`. Also add tests for these API points, both for the happy paths and for the vulnerable ones. PiperOrigin-RevId: 332563222 Change-Id: Ib3b52116a83a134c2e742a7c66e5e956db8fba05 tensorflow/core/kernels/count_ops.cc | ...
{"CWE-617":"Reachable Assertion"}
GHSA-pqjc-5x4q-33rx
null
[ { "commit_message": "[PATCH] [media] media-device: fix infoleak in ioctl media_enum_entities() MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit This fixes CVE-2014-1739. Signed-off-by: Salva Peiró <speiro@ai2.upv.es> Acked-by: Laurent Pinchart <laurent.pinchart@ideasonbo...
null
CVE-2023-32698
nfpm vulnerable to Incorrect Default Permissions
nFPM is an alternative to fpm. The file permissions on the checked-in files were not maintained. Hence, when nfpm packaged the files (without extra config for enforcing it’s own permissions) files could go out with bad permissions (chmod 666 or 777). Anyone using nfpm for creating packages without checking/setting file permissions before packaging could result in bad permissions for files/folders.
[ { "commit_message": "[PATCH] sec: fix for CVE-2023-32698 This commit merely documents all commits related to fixing CVE-2023-32698, as they were a bit spread. It also has the intent of showing up properly in our changelog. Here's the commit list: * 8e517cca1704e5af68769e9401e51ea139022f9c * f64a311eefea340cd3f2...
CWE-276: Incorrect Default Permissions
GHSA-vw4f-g2ch-x868
null
[ { "commit_message": "[PATCH] ofz#889 readjust jpeg import MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Change-Id: I4e25db429b8dee9265ab2ad468c21cc34a50df6c Reviewed-on: https://gerrit.libreoffice.org/35325 Tested-by: Jenkins <ci@libreoffice.org> Reviewed-by: Caolán M...
null
GHSA-9q2q-rv8x-x676
null
[ { "commit_message": "[PATCH] Add session regenerate after login & logout. Secure cookie if HTTPS. close #1473 system/core/config.php | 2 +- system/core/user.php | 21 ++++++++++++++++++++- 2 files changed, 21 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBjYTVmMTUwZGExMWQ5Y2FhZTg2NjM4ODg1MTM3YW...
null
PYSEC-2021-230
null
[ { "commit_message": "[PATCH] Prevent division by 0 PiperOrigin-RevId: 370979352 Change-Id: Ic79191c316d986fc6072ecaebfec9d5f2b924d00 tensorflow/lite/kernels/batch_to_space_nd.cc | 1 + 1 file changed, 1 insertion(+)", "patch_text_b64": "RnJvbSAyYzc0Njc0MzQ4YTQ3MDhjZWQ1OGFkNmViMWIyMzM1NGRmOGVlMDQ0IE1vbiBTZXAg...
null
GHSA-23g5-cwwr-8xhw
null
[ { "commit_message": "[PATCH] ceph-volume: honour osd_dmcrypt_key_size option ceph-volume doesn't honour osd_dmcrypt_key_size. It means the default size is always applied. It also changes the default value in `get_key_size_from_conf()` From cryptsetup manpage: > For XTS mode you can optionally set a key size of ...
null
GHSA-gxh7-wv9q-fwfr
Electron's Content-Secrity-Policy disabling eval not applied consistently in renderers with sandbox disabled
null
[ { "commit_message": "[PATCH] fix: blend node and blink code generation policy when both are loaded (#36567) patches/chromium/.patches | 1 + ...egenerationcheckcallbackinmainthread.patch | 38 ++++++++++++++++ patches/node/.patches | 1 + ...ol_codegenerationfromstring...
null
CVE-2022-2564
Prototype Pollution in automattic/mongoose
Prototype Pollution in GitHub repository automattic/mongoose prior to 6.4.6.
[ { "commit_message": "[PATCH] fix(schema): disallow setting __proto__ when creating schema with dotted properties Fix #12085 lib/schema.js | 7 +++++++ test/schema.test.js | 10 ++++++++++ 2 files changed, 17 insertions(+)", "patch_text_b64": "RnJvbSBhNDVjZmI2YjBjZTAwNjdhZTk3OTRjZmE4MGY3OTE3ZTFmYjNjNmY4...
CWE-1321 Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
CVE-2017-12988
The telnet parser in tcpdump before 4.9.2 has a buffer over-read in print-telnet.c:telnet_parse().
[ { "commit_message": "[PATCH] CVE-2017-12988/TELNET: Add a missing bounds check. MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit This fixes a buffer over-read discovered by Forcepoint's security researchers Otto Airamo & Antti Levomäki. Add a test using the capture file ...
n/a
CVE-2012-0058
The kiocb_batch_free function in fs/aio.c in the Linux kernel before 3.2.2 allows local users to cause a denial of service (OOPS) via vectors that trigger incorrect iocb management.
[ { "commit_message": "[PATCH] Unused iocbs in a batch should not be accounted as active. commit 69e4747ee9727d660b88d7e1efe0f4afcb35db1b upstream. Since commit 080d676de095 (\"aio: allocate kiocbs in batches\") iocbs are allocated in a batch during processing of first iocbs. All iocbs in a batch are automatical...
n/a
GHSA-9p95-fxvg-qgq2
simple-git vulnerable to Remote Code Execution when enabling the ext transport protocol
null
[ { "commit_message": "[PATCH] Chore: bump lerna, jest and create prettier workflow (#862) * Chore: bump lerna to latest `6.0.3` * Chore: prettier and add lint action .changeset/poor-tools-doubt.md | 5 + .changeset/skip-hop-jump.md | 6 + .github/FUNDING.yml ...
null
CVE-2018-10574
site/index.php/admin/trees/add/ in BigTree 4.2.22 and earlier allows remote attackers to upload and execute arbitrary PHP code because the BigTreeStorage class in core/inc/bigtree/apis/storage.php does not prevent uploads of .htaccess files.
[ { "commit_message": "[PATCH] Rejecting htaccess files: https://github.com/bigtreecms/BigTree-CMS/issues/335 core/inc/bigtree/apis/storage.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA2MDliZDE3NzI4ZWUxZGIwNDg3YTQyZDk2MDI4ZDMwNTM3NTI4YWU4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAw...
n/a
CVE-2025-55205
Capsule tenant owners with "patch namespace" permission can hijack system namespaces label
Capsule is a multi-tenancy and policy-based framework for Kubernetes. A namespace label injection vulnerability in Capsule v0.10.3 and earlier allows authenticated tenant users to inject arbitrary labels into system namespaces (kube-system, default, capsule-system), bypassing multi-tenant isolation and potentially accessing cross-tenant resources through TenantResource selectors. This vulnerability enables privilege escalation and violates the fundamental security boundaries that Capsule is designed to enforce. This vulnerability is fixed in 0.10.4.
[ { "commit_message": "[PATCH] Merge commit from fork MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Signed-off-by: Oliver Bähler <oliverbaehler@hotmail.com> e2e/namespace_hijacking_test.go | 36 ++++++++++++++++++++++- pkg/webhook/namespace/validation/patch.go ...
CWE-863: Incorrect Authorization
CVE-2021-36753
sharkdp BAT before 0.18.2 executes less.exe from the current working directory.
[ { "commit_message": "[PATCH] Fix for Windows: do not run binaries from CWD This fixes a bug on Windows where `Command::new` would also run executables from the current working directory, possibly resulting in accidental runs of programs called `less`. Cargo.lock | 29 +++++++++++++++++++++++++++++ Cargo.toml ...
n/a
GHSA-j26p-6wx7-f3pw
Youki: If /proc and /sys in the rootfs are symbolic links, they can potentially be exploited to gain access to the host root filesystem.
null
[ { "commit_message": "[PATCH] Merge commit from fork Signed-off-by: Yusuke Sakurai <yusuke.sakurai@3-shake.com> crates/libcontainer/src/rootfs/mod.rs | 2 + crates/libcontainer/src/rootfs/mount.rs | 298 +++++++++++++++++- tests/contest/contest/src/main.rs | 3 + tests/contest/contest/...
null
GHSA-7prf-vw4p-qr59
Prototype pollution in supermixer
null
[ { "commit_message": "[PATCH] Avoiding prototype pollution src/mixer.js | 3 +++ test/merge.js | 10 ++++++++++ 2 files changed, 13 insertions(+)", "patch_text_b64": "RnJvbSA5NGRjYzZmYzQ1ZTBmZWQ5NjE4N2NiNTJhYWZmYWRmNzZkYmJjMGEzIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiB2YXN5bCA8dmFzeWxAZmxhc2gtZnguY29tLmF1Pg...
null
GHSA-xp5g-whvx-3f7g
null
[ { "commit_message": "[PATCH] add some boundary checks on gf_text_get_utf8_line (#1188) applications/mp4client/main.c | 2 +- src/media_tools/text_import.c | 77 +++++++++++++++++++++++------------ 2 files changed, 53 insertions(+), 26 deletions(-)", "patch_text_b64": "RnJvbSAxYzQ0OWEzNGZlMGI1MGFhZmZiODgxYmZi...
null
CVE-2024-32034
Cross-site scripting (XSS) in the decidim admin activity log
decidim is a Free Open-Source participatory democracy, citizen participation and open government for cities and organizations. The admin panel is subject to potential Cross-site scripting (XSS) attach in case an admin assigns a valuator to a proposal, or does any other action that generates an admin activity log where one of the resources has an XSS crafted. This issue has been addressed in release version 0.27.7, 0.28.2, and newer. Users are advised to upgrade. Users unable to upgrade may redirect the pages /admin and /admin/logs to other admin pages to prevent this access (i.e. `/admin/organization/edit`).
[ { "commit_message": "[PATCH] Backport 'Refactor malformed titles in admin logs (part 2)' to v0.28 (#13083) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit * Refactor malformed titles in admin logs (part 2) * Refactor admin logs * Component presenters * Various logs * Mo...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-0297
Code Injection in pyload/pyload
Code Injection in GitHub repository pyload/pyload prior to 0.5.0b3.dev31.
[ { "commit_message": "[PATCH] fix arbitrary python code execution by abusing js2py functionality src/pyload/core/utils/misc.py | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA3ZDczYmE3OTE5ZTU5NGQ3ODNiMzQxMWQ3ZGRiODc4ODVhZWE3ODJkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBHYW...
CWE-94 Improper Control of Generation of Code
CVE-2024-53848
check-jsonschema default caching for remote schemas allows for cache confusion
check-jsonschema is a CLI and set of pre-commit hooks for jsonschema validation. The default cache strategy uses the basename of a remote schema as the name of the file in the cache, e.g. `https://example.org/schema.json` will be stored as `schema.json`. This naming allows for conflicts. If an attacker can get a user to run `check-jsonschema` against a malicious schema URL, e.g., `https://example.evil.org/schema.json`, they can insert their own schema into the cache and it will be picked up and used instead of the appropriate schema. Such a cache confusion attack could be used to allow data to pass validation which should have been rejected. This issue has been patched in version 0.30.0. All users are advised to upgrade. A few workarounds exist: 1. Users can use `--no-cache` to disable caching. 2. Users can use `--cache-filename` to select filenames for use in the cache, or to ensure that other usages do not overwrite the cached schema. (Note: this flag is being deprecated as part of the remediation effort.) 3. Users can explicitly download the schema before use as a local file, as in `curl -LOs https://example.org/schema.json; check-jsonschema --schemafile ./schema.json`
[ { "commit_message": "[PATCH 1/2] Internal refactor: no default cache dirname The two cache dirs are currently \"refs\" and \"downloads\". Make these always explicit, rather than `\"downloads\"` being an internal default baked into the downloader. src/check_jsonschema/cachedownloader.py | 11 +++-------- s...
CWE-349: Acceptance of Extraneous Untrusted Data With Trusted Data
GHSA-cwq6-mjmx-47p6
XWiki's scheduler in subwiki allows scheduling operations for any main wiki user
null
[ { "commit_message": "[PATCH] XWIKI-21663: Improve Scheduler access .../resources/ApplicationResources.properties | 1 + .../xwiki-platform-scheduler-ui/pom.xml | 21 +++ .../src/main/resources/Scheduler/WebHome.xml | 53 +++--- .../resources/Scheduler/WebPreferences.xml | 168 +----------------- .../x...
null
GHSA-8x9g-h36m-4rg2
null
[ { "commit_message": "[PATCH] Fix #12372 and #12373 - Crash in x86 assembler (#12380) 0 ,0,[bP-bL-bP-bL-bL-r-bL-bP-bL-bL- mov ,0,[ax+Bx-ax+Bx-ax+ax+Bx-ax+Bx-- leA ,0,[bP-bL-bL-bP-bL-bP-bL-60@bL- leA ,0,[bP-bL-r-bP-bL-bP-bL-60@bL- mov ,0,[ax+Bx-ax+Bx-ax+ax+Bx-ax+Bx-- libr/asm/p/asm_x86_nz.c | 11 +++++++---- 1 fil...
null
GHSA-9pjf-jw9q-fx49
Cross-site Scripting (XSS) in dolibarr/dolibarr
null
[ { "commit_message": "[PATCH] Fix #hunter7a048bb7-bfdd-4299-931e-9bc283e92bc8 htdocs/main.inc.php | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBmNTY5MDQ4ZWIyYmQ4MjM1MjViY2U0ZWY1MjMxNmU3YTgzZTMzNDVjIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBMYXVyZW50IERlc3RhaWxsZXVyIDxl...
null
GHSA-x84j-v2j2-g9v8
null
[ { "commit_message": "[PATCH] fix: [security] XSS in workflow execution-path - As reported by Franck FERMAN app/View/Elements/Workflows/executionPath.ctp | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSAxZjM5ZGViNTcyZGE3ZWNiNTg1NWUzMGZmM2NjOGNiY2FhMGMxMDU0IE1vbiBTZXAgMTc...
null
CVE-2024-38516
Aimeos HTML client may potentially reveal sensitive information in error log
ai-client-html is an Aimeos e-commerce HTML client component. Debug information revealed sensitive information from environment variables in error log. This issue has been patched in versions 2024.04.7, 2023.10.15, 2022.10.13 and 2021.10.22.
[ { "commit_message": "[PATCH] Don't log security relevant data to prevent revealing information src/Client/Html/Checkout/Confirm/Standard.php | 6 +----- 1 file changed, 1 insertion(+), 5 deletions(-)", "patch_text_b64": "RnJvbSBiYjM4OTYyMGZmYzNjZjRhMmYyOWMxMWExZTVmNTEyMDQ5ZTBjMTMyIE1vbiBTZXAgMTcgMDA6MDA6MDAg...
CWE-1295: Debug Messages Revealing Unnecessary Information
CVE-2025-59058
httpsig-rs's HMAC verification is vulnerable to timing attack
httpsig-rs is a Rust implementation of IETF RFC 9421 http message signatures. Prior to version 0.0.19, the HMAC signature comparison is not timing-safe. This makes anyone who uses HS256 signature verification vulnerable to a timing attack that allows the attacker to forge a signature. Version 0.0.19 fixes the issue.
[ { "commit_message": "[PATCH] security: make HS256 validation constant-time httpsig/src/crypto/symmetric.rs | 15 ++++++++------- 1 file changed, 8 insertions(+), 7 deletions(-)", "patch_text_b64": "RnJvbSAzODFiYzY2MzMzZDNjY2Q3YWYyZDhiMTczYWZlZTNjNTIzZjI4ZGVjIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBPbGVrc2l...
CWE-208: Observable Timing Discrepancy
GHSA-455w-c45v-86rg
fastify vulnerable to denial of service via malicious Content-Type
null
[ { "commit_message": "[PATCH] Merge pull request from GHSA-455w-c45v-86rg * Add safeguard against malicious content types * Update lib/contentTypeParser.js Co-authored-by: Manuel Spigolon <behemoth89@gmail.com> * Apply spelling fixes from code review Co-authored-by: James Sumners <james@sumners.email> Co-authore...
null
CVE-2015-8213
The get_format function in utils/formats.py in Django before 1.7.x before 1.7.11, 1.8.x before 1.8.7, and 1.9.x before 1.9rc2 might allow remote attackers to obtain sensitive application secrets via a settings key in place of a date/time format setting, as demonstrated by SECRET_KEY.
[ { "commit_message": "[PATCH] Fixed a settings leak possibility in the date template filter. This is a security fix. django/utils/formats.py | 20 ++++++++++++++++++++ docs/releases/1.7.11.txt | 15 ++++++++++++++- docs/releases/1.8.7.txt | 15 ++++++++++++++- tests/i18n/tests.py | 3 +++ 4 files changed, 51...
n/a
GHSA-74cr-77xc-8g6r
Prototype Pollution in @apollo/gateway
null
[ { "commit_message": "[PATCH] Ignore __proto__ fields in deepMerge packages/apollo-gateway/src/utilities/deepMerge.ts | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBjZWE3Mzk3NTgyYTI5M2FmNmE1ZjYwOTQ3ZGEzNGI5NWU2NjljNmMxIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBUcmV2b3IgU2NoZ...
null
GHSA-6v3g-ccfx-69c7
null
[ { "commit_message": "[PATCH] Update requirements.txt requirements.txt | 1 + 1 file changed, 1 insertion(+)", "patch_text_b64": "RnJvbSBiNDdlMTBiOTU0ODNhYTg0NThiNjRkMjMzNTA4NDRjMjllOTFjNDA4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBaaWppYW4gWmhhbmcgPGNrY3p6akBnbWFpbC5jb20+CkRhdGU6IFR1ZSwgMTggTm92IDIwMjUgMTE6...
null
GHSA-r48p-vhgj-x8mm
Unvalidated redirects
null
[ { "commit_message": "[PATCH] [server/auth] ensure safe returnTo param components/server/src/user/user-controller.ts | 6 ++++++ 1 file changed, 6 insertions(+)", "patch_text_b64": "RnJvbSA4Y2E0MzFmODZhZTNhNmY5YTE3YWZjZmVkNTFjZGQwNjVmY2ZmMWE1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBbGV4IFR1Z2FyZXYgPGFsZXgu...
null
GHSA-34q3-p352-c7q8
Central Dogma Authentication Bypass Vulnerability via Session Leakage
null
[ { "commit_message": "[PATCH] Merge pull request from GHSA-34q3-p352-c7q8 Motivation: SAML `RelayState` is utilized to direct authenticated users to the correct resource. As it is inserted into the HTML document, proper HTML-escaping is crucial to prevent potential security risks, such as XSS attacks. [Reference...
null
GHSA-864f-7xjm-2jp2
CNCF K3s Kubernetes kubelet configuration exposes credentials
null
[ { "commit_message": "[PATCH] Set kubelet read-only-port via CLI flag Signed-off-by: Brad Davidson <brad.davidson@rancher.com> pkg/daemons/agent/agent.go | 1 - pkg/daemons/agent/agent_linux.go | 3 +++ pkg/daemons/agent/agent_windows.go | 3 +++ 3 files changed, 6 insertions(+), 1 deletion(-)", "patc...
null
GHSA-rcjw-9639-853h
null
[ { "commit_message": "[PATCH] oberthur: Correctly check for return values Thanks oss-fuzz https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28843 src/libopensc/pkcs15-oberthur.c | 13 +++++++------ 1 file changed, 7 insertions(+), 6 deletions(-)", "patch_text_b64": "RnJvbSAxZGI4ODM3NGJiNzcwNmExMTVkNWMzNjE...
null
CVE-2013-7269
The nr_recvmsg function in net/netrom/af_netrom.c in the Linux kernel before 3.12.4 updates a certain length value without ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
[ { "commit_message": "[PATCH] net: rework recvmsg handler msg_name and msg_namelen logic This patch now always passes msg->msg_namelen as 0. recvmsg handlers must set msg_namelen to the proper size <= sizeof(struct sockaddr_storage) to return msg_name to the user. This prevents numerous uninitialized memory leak...
n/a
CVE-2023-40267
GitPython before 3.1.32 does not block insecure non-multi options in clone and clone_from. NOTE: this issue exists because of an incomplete fix for CVE-2022-24439.
[ { "commit_message": "[PATCH] Block insecure non-multi options in clone/clone_from Follow-up to #1521 git/repo/base.py | 2 ++ test/test_repo.py | 24 +++++++++++++++++++++++- 2 files changed, 25 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA1YzU5ZTBkNjNkYTYxODBkYjhhMGIzNDlmMGFkMzZmZWY0MmFjZWVkIE1...
n/a
GHSA-m6g2-339q-45j8
null
[ { "commit_message": "[PATCH] pkp/pkp-lib#9322 Escape user group name in user list export classes/components/forms/statistics/users/ReportForm.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAxOGIzMThmODMxMDVmZmE3ZmEyMTQxNzlmOGUyMDUwN2IwNzU0MjM2IE1vbiBTZXAgMTcgMDA6MDA6MDAg...
null
CVE-2025-26794
Exim 4.98 before 4.98.1, when SQLite hints and ETRN serialization are used, allows remote SQL injection. (Resolving SQL injection requires an update to 4.99.1 in certain non-default rate-limit configurations.)
[ { "commit_message": "[PATCH] update to exim-4.98.1, from Renaud Allard (maintainer) https://exim.org/static/doc/security/CVE-2025-26794.txt (sql injection, reachable if using the sqlite FLAVOR and if ETRN is enabled in config; default is disabled) mail/exim/Makefile | 4 +--- mail/exim/distinfo | 4 ++-- 2 files ...
CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2023-41053
Redis SORT_RO may bypass ACL configuration
Redis is an in-memory database that persists on disk. Redis does not correctly identify keys accessed by `SORT_RO` and as a result may grant users executing this command access to keys that are not explicitly authorized by the ACL configuration. The problem exists in Redis 7.0 or newer and has been fixed in Redis 7.0.13 and 7.2.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
[ { "commit_message": "[PATCH] Fix sort_ro get-keys function return wrong key number (#12522) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Before: ``` 127.0.0.1:6379> command getkeys sort_ro key (empty array) 127.0.0.1:6379> ``` After: ``` 127.0.0.1:6379> command getke...
CWE-269: Improper Privilege Management
CVE-2024-47534
Incorrect delegation lookups can make go-tuf download the wrong artifact
go-tuf is a Go implementation of The Update Framework (TUF). The go-tuf client inconsistently traces the delegations. For example, if targets delegate to "A", and to "B", and "B" delegates to "C", then the client should trace the delegations in the order "A" then "B" then "C" but it may incorrectly trace the delegations "B"->"C"->"A". This vulnerability is fixed in 2.0.1.
[ { "commit_message": "[PATCH] Initial commit Signed-off-by: Radoslav Dimitrov <dimitrovr@vmware.com> NOTES.md | 10 + README.md | 72 ++++ examples/basic_repo.go | 462 ++++++++++++++++++++++++ examples/testdata/1.python-scripts.json | ...
CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
GHSA-wpfr-6297-9v57
User object created with invalid provider data in GoTrue
null
[ { "commit_message": "[PATCH] Handle failed status code in provider requests (#313) api/provider/provider.go | 19 +++++++++++++++ api/provider/provider_test.go | 44 +++++++++++++++++++++++++++++++++++ 2 files changed, 63 insertions(+) create mode 100644 api/provider/provider_test.go", "patch_text_b64": ...
null
CVE-2024-1163
Path traversal vulnerability in mapshaper
The attacker may exploit a path traversal vulnerability leading to information disclosure.
[ { "commit_message": "[PATCH] v0.6.44 CHANGELOG.md | 4 ++++ REFERENCE.md | 4 +++- bin/mapshaper-gui | 11 +++++++++-- package-lock.json | 4 ++-- package.json | 2 +- 5 files changed, 19 insertions(+), 6 deletions(-)", "patch_text_b64": "RnJvbSA3NDM3ZDkwM2MwYTg3ODAyYzM3NTFmYzUyOWQyZGU3MDk4MDk...
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
GHSA-jc7g-x28f-3v3h
listmonk's Sprig template Injection vulnerability leads to reading of Environment Variable for low privilege user
null
[ { "commit_message": "[PATCH] Remove dangerous tpl funcs in Sprig that's enabled by default. `env` and `expandenv` template functions in the Sprig library allow accessing system environment variables within campaign templates. cmd/init.go | 6 +++++- internal/manager/manager.go | 6 +++++- 2 files ...
null
CVE-2025-31490
AutoGPT allows SSRF due to DNS Rebinding in requests wrapper
AutoGPT is a platform that allows users to create, deploy, and manage continuous artificial intelligence agents that automate complex workflows. Prior to 0.6.1, AutoGPT allows SSRF due to DNS Rebinding in requests wrapper. AutoGPT is built with a wrapper around Python's requests library, hardening the application against SSRF. The code for this wrapper can be found in autogpt_platform/backend/backend/util/request.py. The requested hostname of a URL which is being requested is validated, ensuring that it does not resolve to any local ipv4 or ipv6 addresses. However, this check is not sufficient, as a DNS server may initially respond with a non-blocked address, with a TTL of 0. This means that the initial resolution would appear as a non-blocked address. In this case, validate_url() will return the url as successful. After validate_url() has successfully returned the url, the url is then passed to the real request() function. When the real request() function is called with the validated url, request() will once again resolve the address of the hostname, because the record will not have been cached (due to TTL 0). This resolution may be in the "invalid range". This type of attack is called a "DNS Rebinding Attack". This vulnerability is fixed in 0.6.1.
[ { "commit_message": "[PATCH] fix(backend): Increase block request security; Prevent DNS rebinding & open redirect attack (#9688) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit The current block web requests utility has a logic to avoid the system firing into blockliste...
CWE-918: Server-Side Request Forgery (SSRF)
GHSA-j3rg-3rgm-537h
Directus vulnerable to Server-Side Request Forgery On File Import
null
[ { "commit_message": "[PATCH] Cleanup request handler Squashed commit of the following: commit 90368698c81ed731c6d9be8b02bfa8ad1b5edd3f Author: rijkvanzanten <rijkvanzanten@me.com> Cleanup commit 61514f45096c22878527f4813fcb78d3b19e4687 Author: rijkvanzanten <rijkvanzanten@me.com> Rename to index commit 38fe6b84...
null
CVE-2025-34174
Netgate pfSense CE Status_Traffic_Totals Package v2.3.2_7 Stored Cross-Site Scripting
In pfSense CE /usr/local/www/status_traffic_totals.php, the value of the start-day parameter is not ensured to be a numeric value or sanitized of HTML-related characters/strings before being directly displayed in the input box. This value can be saved as the default value to be displayed to all users when visiting the Status Traffic Totals page, resulting in stored cross-site scripting. The attacker must be authenticated with at least "WebCfg - Status: Traffic Totals" permissions.
[ { "commit_message": "[PATCH] Status_Traffic_Totals input validation. Fixes #16413 .../Makefile | 3 +- .../usr/local/www/status_traffic_totals.php | 80 ++++++++++++++----- 2 files changed, 62 insertions(+), 21 deletions(-)", "patch_text_b64": "RnJvbSA5ZTQxMmVkZjYyMTEzMzAzY...
CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
CVE-2019-15149
core.py in Mitogen before 0.2.8 has a typo that drops the unidirectional-routing protection mechanism in the case of a child that is initiated by another child. The Ansible extension is unaffected. NOTE: the vendor disputes this issue because it is exploitable only in conjunction with hypothetical other factors, i.e., an affected use case within a library caller, and a bug in the message receiver policy code that led to reliance on this extra protection mechanism
[ { "commit_message": "[PATCH] [security] core: undirectional routing wasn't respected in some cases When creating a context using Router.method(via=somechild), unidirectional mode was set on the new child correctly, however if the child were to call Router.method(), due to a typing mistake the new child would st...
n/a
CVE-2016-4979
The Apache HTTP Server 2.4.18 through 2.4.20, when mod_http2 and mod_ssl are enabled, does not properly recognize the "SSLVerifyClient require" directive for HTTP/2 request authorization, which allows remote attackers to bypass intended access restrictions by leveraging the ability to send multiple requests over a single connection and aborting a renegotiation.
[ { "commit_message": "[PATCH] modssl: reset client-verify state when renegotiation is aborted git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1750779 13f79535-47bb-0310-9956-ffa450edef68 CHANGES | 3 +++ modules/ssl/ssl_engine_kernel.c | 1 + 2 files changed, 4 insertions(+)"...
n/a
CVE-2024-35366
FFmpeg n6.1.1 is Integer Overflow. The vulnerability exists in the parse_options function of sbgdec.c within the libavformat module. When parsing certain options, the software does not adequately validate the input. This allows for negative duration values to be accepted without proper bounds checking.
[ { "commit_message": "[PATCH] avformat/sbgdec: Check for negative duration Fixes: signed integer overflow: 9223372036854775807 - -8000000 cannot be represented in type 'long' Fixes: 62276/clusterfuzz-testcase-minimized-ffmpeg_dem_SBG_fuzzer-5133181743136768 Found-by: continuous fuzzing process https://github.com...
n/a
CVE-2024-47604
XSS vulnerability in NuGetGallery HTML attributes handling
NuGet Gallery is a package repository that powers nuget.org. The NuGetGallery has a security vulnerability in its handling of HTML element attributes, which allows an attacker to execute arbitrary HTML or Javascript code in a victim's browser.
[ { "commit_message": "[PATCH] Fix for issues with root page styling (#10193) We only have [custom styles](https://github.com/NuGet/NuGetGallery/blob/f1434e76555bf7c8f8b29b0e9a7d08f1f1b76982/src/Bootstrap/less/theme/base.less#L624-L636) for when `id=\"/\"`, no need to have it specified in any other case. Also fix...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2017-18241
fs/f2fs/segment.c in the Linux kernel before 4.13 allows local users to cause a denial of service (NULL pointer dereference and panic) by using a noflush_merge option that triggers a NULL value for a flush_cmd_control data structure.
[ { "commit_message": "[PATCH] f2fs: fix a panic caused by NULL flush_cmd_control Mount fs with option noflush_merge, boot failed for illegal address fcc in function f2fs_issue_flush: if (!test_opt(sbi, FLUSH_MERGE)) { ret = submit_flush_wait(sbi); atomic_inc(&fcc->issued_flush); -> Here, fcc illegal return re...
n/a
CVE-2021-21250
Post-Auth External Entity Expansion (XXE)
OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, there is a critical vulnerability which may lead to arbitrary file read. When BuildSpec is provided in XML format, the spec is processed by XmlBuildSpecMigrator.migrate(buildSpecString); which processes the XML document without preventing the expansion of external entities. These entities can be configured to read arbitrary files from the file system and dump their contents in the final XML document to be migrated. If the files are dumped in properties included in the YAML file, it will be possible for an attacker to read them. If not, it is possible for an attacker to exfiltrate the contents of these files Out Of Band. This issue was addressed in 4.0.3 by ignoring ENTITY instructions in xml file.
[ { "commit_message": "[PATCH] Fix XXE injection attack by disabling XML DTD handling .../io/onedev/server/migration/XmlBuildSpecMigrator.java | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA5MTk2ZmQ3OTVlODdkYWIwNjliNDI2MGEzNTkwYTBlYTg4NmU3NzBmIE1vbiBTZXAgMTcgMDA6MDA6...
CWE-538 File and Directory Information Exposure
GHSA-275c-w5mq-v5m2
PaddlePaddle floating point exception in paddle.argmin and paddle.argmax
null
[ { "commit_message": "[PATCH] add arg check for argmin and argmax (#59976) paddle/phi/kernels/cpu/arg_min_max_kernel.cc | 5 +++++ paddle/phi/kernels/gpu/arg_min_max_kernel.cu | 5 +++++ paddle/phi/kernels/xpu/arg_min_max_kernel.cc | 5 +++++ 3 files changed, 15 insertions(+)", "patch_text_b64": "RnJvbSA2ZWY3MT...
null
CVE-2022-39269
Media transport downgrade from the secure version (SRTP) to non-secure (RTP) in pjsip
PJSIP is a free and open source multimedia communication library written in C. When processing certain packets, PJSIP may incorrectly switch from using SRTP media transport to using basic RTP upon SRTP restart, causing the media to be sent insecurely. The vulnerability impacts all PJSIP users that use SRTP. The patch is available as commit d2acb9a in the master branch of the project and will be included in version 2.13. Users are advised to manually patch or to upgrade. There are no known workarounds for this vulnerability.
[ { "commit_message": "[PATCH] Merge pull request from GHSA-wx5m-cj97-4wwg pjmedia/src/pjmedia/transport_srtp.c | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBkMmFjYjlhZjRlMjdiNWJhNzVkNjU4NjkwNDA2Y2VjOWMyNzRjNWNjIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBSaXphIFN1bGlzdHl...
CWE-319: Cleartext Transmission of Sensitive Information
CVE-2020-11735
The private-key operations in ecc.c in wolfSSL before 4.4.0 do not use a constant-time modular inverse when mapping to affine coordinates, aka a "projective coordinates leak."
[ { "commit_message": "[PATCH] Constant time EC map to affine for private operations For fast math, use a constant time modular inverse when mapping to affine when operation involves a private key - key gen, calc shared secret, sign. wolfcrypt/src/ecc.c | 54 ++++++++++++++++++++++++----- wolfcrypt/src/tfm.c ...
n/a
GHSA-pcx2-r23v-3j7c
null
[ { "commit_message": "[PATCH] kernel: harden the signature check (#1027) kernel/Makefile | 4 +- kernel/apk_sign.c | 198 +++++++++++++++++++++++---------- kernel/apk_sign.h | 5 +- kernel/manager.c | 2 +- scripts/check_v2.c | 174 ------------...
null
GHSA-grgm-pph5-j5h7
Exposure of Sensitive Information to an Unauthorized Actor in ansible
null
[ { "commit_message": "[PATCH] safe_eval fix (#57188) * just dont pass locals - also fix globals - added tests * fixed tests (cherry picked from commit b9b0b230150eceb442c34c917d9e852d5e8b7371) changelogs/fragments/fix_safe_eval.yml | 2 + lib/ansible/template/__init__.py | 2 +- lib/ansible/t...
null
GHSA-hhq7-jf2p-hw9c
Moodle multiple cross-site request forgery (CSRF) vulnerabilities
null
[ { "commit_message": "[PATCH] MDL-48106 mod_glossary: Add missing sesskey checks mod/glossary/editcategories.html | 1 + mod/glossary/editcategories.php | 4 ++++ 2 files changed, 5 insertions(+)", "patch_text_b64": "RnJvbSA1NzcwZTUxNDc4MzhhYTA2YTNlY2RmZjZmYzNhZWJiYmQxN2ZmZjkwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwM...
null
GHSA-w5rh-j4g3-jr29
Missing Authorization in Jenkins S3 publisher Plugin
null
[ { "commit_message": "[PATCH] [SECURITY-2201] .../java/hudson/plugins/s3/S3BucketPublisher.java | 13 +++++++++++-- 1 file changed, 11 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSAyZTg1ZTQ1YzBlNGU3YTkyMzFiMDMxNzM5MjkyOGUyZDE5ZTc3MzY4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBZHJpZW4gTGVjaGFycG...
null
CVE-2025-5700
Simple Logo Carousel <= 1.9.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via id Parameter
The Simple Logo Carousel plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘id’ parameter in all versions up to, and including, 1.9.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[ { "commit_message": "[PATCH] fixed wordfence vulnurbility for Id attribute includes/Base/Shortcode.php | 11 +++++++---- 1 file changed, 7 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSBkOTk1YjVkMzVlMGZkYzBhNTkzMDdjZTY2NGU0Y2UxMTU4YjY5YmZmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBzdW5qYXZhMTEgPHN...
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-48299
TorchServe ZipSlip
TorchServe is a tool for serving and scaling PyTorch models in production. Starting in version 0.1.0 and prior to version 0.9.0, using the model/workflow management API, there is a chance of uploading potentially harmful archives that contain files that are extracted to any location on the filesystem that is within the process permissions. Leveraging this issue could aid third-party actors in hiding harmful code in open-source/public models, which can be downloaded from the internet, and take advantage of machines running Torchserve. The ZipSlip issue in TorchServe has been fixed by validating the paths of files contained within a zip archive before extracting them. TorchServe release 0.9.0 includes fixes to address the ZipSlip vulnerability.
[ { "commit_message": "[PATCH] fix zip slip error (#2634) .../pytorch/serve/archive/utils/ZipUtils.java | 19 +++++++++++++++++-- 1 file changed, 17 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBiZmIzZDQyMzk2NzI3NjE0YWVmNjI1MTQzYjQzODFlNjQxNDJmOWJiIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBNYXJrIFN...
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2025-54956
The gh package before 1.5.0 for R delivers an HTTP response in a data structure that includes the Authorization header from the corresponding HTTP request.
[ { "commit_message": "[PATCH] Do not save request headers in the return value Closes #222. .vscode/settings.json | 3 ++- DESCRIPTION | 2 +- NEWS.md | 27 +++++++++++++++++++++++---- R/gh.R | 2 +- R/gh_response.R ...
CWE-669 Incorrect Resource Transfer Between Spheres
GHSA-m6pr-xcrm-4qqp
XSS in Ignite Realtime Openfire via isTrustStore
null
[ { "commit_message": "[PATCH] Fix issues identified by CSW (#1561) .../jivesoftware/admin/servlet/SystemCacheDetailsServlet.java | 2 +- xmppserver/src/main/webapp/import-truststore-certificate.jsp | 2 +- xmppserver/src/main/webapp/security-certificate-details.jsp | 2 +- xmppserver/src/main/webapp/system-ca...
null
CVE-2018-1128
It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network can use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.
[ { "commit_message": "[PATCH] auth/cephx: add authorizer challenge Allow the accepting side of a connection to reject an initial authorizer with a random challenge. The connecting side then has to respond with an updated authorizer proving they are able to decrypt the service's challenge and that the new author...
CWE-294
CVE-2024-0006
DB User Password Leak in Application Log
Information exposure in the logging system in Yugabyte Platform allows local attackers with access to application logs to obtain database user credentials in log files, potentially leading to unauthorized database access.
[ { "commit_message": "[PATCH] [BACKPORT 2.18][PLAT-14286] Potential Security Issue: Password Leak in Application Log Summary: Original diff - https://phorge.dev.yugabyte.com/D35975 (553e70deb02f16ac9546ebd47f4651663b593088) This is more of a point fix because the node-agent java client changes are not present in...
CWE-532 Insertion of Sensitive Information into Log File
GHSA-7r96-8g3x-g36m
Improper Verification of Cryptographic Signature
null
[ { "commit_message": "[PATCH] Critical security fix in verifyWithMessage node/tenvoy.js | 2 +- tenvoy.js | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBhMTIxYjM0YTQ1ZTI4OWQ3NzVjNjJlNTg4NDE1MjI4OTFkZWU2ODZiIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBDTUVPTkUgPGNvbnRhY3...
null
CVE-2021-32672
Vulnerability in Lua Debugger in Redis
Redis is an open source, in-memory database that persists on disk. When using the Redis Lua Debugger, users can send malformed requests that cause the debugger’s protocol parser to read data beyond the actual buffer. This issue affects all versions of Redis with Lua debugging support (3.2 or newer). The problem is fixed in versions 6.2.6, 6.0.16 and 5.0.14.
[ { "commit_message": "[PATCH] Fix protocol parsing on 'ldbReplParseCommand' (CVE-2021-32672) The protocol parsing on 'ldbReplParseCommand' (LUA debugging) Assumed protocol correctness. This means that if the following is given: *1 $100 test The parser will try to read additional 94 unallocated bytes after the cl...
CWE-125: Out-of-bounds Read
CVE-2021-32803
Arbitrary File Creation/Overwrite via insufficient symlink protection due to directory cache poisoning
The npm package "tar" (aka node-tar) before versions 6.1.2, 5.0.7, 4.4.15, and 3.2.3 has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary `stat` calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory. This order of operations resulted in the directory being created and added to the `node-tar` directory cache. When a directory is present in the directory cache, subsequent calls to mkdir for that directory are skipped. However, this is also where `node-tar` checks for symlinks occur. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass `node-tar` symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.3, 4.4.15, 5.0.7 and 6.1.2.
[ { "commit_message": "[PATCH] Remove paths from dirCache when no longer dirs lib/unpack.js | 22 +++++++++++++++++++++ test/unpack.js | 53 ++++++++++++++++++++++++++++++++++++++++++++++++++ 2 files changed, 75 insertions(+)", "patch_text_b64": "RnJvbSA5ZGJkZWI2ZGY4ZTlkYmQ5NmZhOWU4NDM0MWI5ZDc0NzM0YmU2YzIwIE1v...
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2021-21433
Remote code execution on discord-recon .dirsearch and .arjun commands due to improper input validation
Discord Recon Server is a bot that allows you to do your reconnaissance process from your Discord. Remote code execution in version 0.0.1 would allow remote users to execute commands on the server resulting in serious issues. This flaw is patched in 0.0.2.
[ { "commit_message": "[PATCH] Fixing Command Injection Issues. app.py | 8 ++++++++ 1 file changed, 8 insertions(+)", "patch_text_b64": "RnJvbSAyNmUyYTA4NDY3OTY3OWNjY2RlZWFiYmI2ODg5Y2UxMjBlZmY3ZTUwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBNb2hhbWVkIERpZWYgPG1kYWlmMTMzMkBnbWFpbC5jb20+CkRhdGU6IFRodSwgMjUgRmViI...
CWE-94 Improper Control of Generation of Code ('Code Injection')
GHSA-vrv9-3x3w-ffxw
node-red-dashboard vulnerable to Cross-site Scripting
null
[ { "commit_message": "[PATCH] Fix ui_text XSS to close #772 CHANGELOG.md | 4 ++ dist/dashboard.appcache | 4 +- dist/js/app.min.js | 4 +- package.json | 2 +- .../ui-component/ui-component-ctrl.js...
null
CVE-2021-39212
Issue when Configuring the ImageMagick Security Policy
ImageMagick is free software delivered as a ready-to-run binary distribution or as source code that you may use, copy, modify, and distribute in both open and proprietary applications. In affected versions and in certain cases, Postscript files could be read and written when specifically excluded by a `module` policy in `policy.xml`. ex. <policy domain="module" rights="none" pattern="PS" />. The issue has been resolved in ImageMagick 7.1.0-7 and in 6.9.12-22. Fortunately, in the wild, few users utilize the `module` policy and instead use the `coder` policy that is also our workaround recommendation: <policy domain="coder" rights="none" pattern="{PS,EPI,EPS,EPSF,EPSI}" />.
[ { "commit_message": "[PATCH] Use the correct rights. MagickCore/module.c | 2 +- MagickCore/static.c | 8 ++++++-- 2 files changed, 7 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSAwMWZhZGRiZTI3MTFhNDE1NjE4MGM0YTkyODM3ZTJmMjM2ODNjYzY4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBEaXJrIExlbXN0cmEgPGRpc...
CWE-668: Exposure of Resource to Wrong Sphere
GHSA-hjq3-qcx4-mc3m
null
[ { "commit_message": "[PATCH] avcodec/dsputil: fix signedness in sizeof() comparissions Signed-off-by: Michael Niedermayer <michaelni@gmx.at> libavcodec/dsputil.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA0NTRhMTFhMWM5YzY4NmM3OGFhOTc5NTQzMDZmYjYzNDUzMjk5NzYwIE1vbiBT...
null
GHSA-v427-c49j-8w6x
Cleartext Storage of Sensitive Information in HMAC SHA256 Authentication
null
[ { "commit_message": "[PATCH 01/33] Initial update to encrypt secretKey .../Authenticators/HmacSha256.php | 17 ++++++++- src/Config/AuthToken.php | 36 +++++++++++++++++++ src/Models/UserIdentityModel.php | 25 +++++++++++-- .../Authenticators/HmacAuthenticatorTest.php...
null
CVE-2023-45130
Frontier opcode SUICIDE touches too many storage values on large contracts
Frontier is Substrate's Ethereum compatibility layer. Prior to commit aea528198b3b226e0d20cce878551fd4c0e3d5d0, at the end of a contract execution, when opcode SUICIDE marks a contract to be deleted, the software uses `storage::remove_prefix` (now renamed to `storage::clear_prefix`) to remove all storages associated with it. This is a single IO primitive call passing the WebAssembly boundary. For large contracts, the call (without providing a `limit` parameter) can be slow. In addition, for parachains, all storages to be deleted will be part of the PoV, which easily exceed relay chain PoV size limit. On the other hand, Frontier's maintainers only charge a fixed cost for opcode SUICIDE. The maintainers consider the severity of this issue high, because an attacker can craft a contract with a lot of storage values on a parachain, and then call opcode SUICIDE on the contract. If the transaction makes into a parachain block, the parachain will then stall because the PoV size will exceed relay chain's limit. This is especially an issue for XCM transactions, because they can't be skipped. Commit aea528198b3b226e0d20cce878551fd4c0e3d5d0 contains a patch for this issue. For parachains, it's recommended to issue an emergency runtime upgrade as soon as possible. For standalone chains, the impact is less severe because the issue mainly affects PoV sizes. It's recommended to issue a normal runtime upgrade as soon as possible. There are no known workarounds.
[ { "commit_message": "[PATCH] Initial support for asynchronous suiciding (#1212) * Initial support for asynchronous suiciding * Use contains_key instead of is_some Co-authored-by: Xiliang Chen <xlchen1291@gmail.com> * Fix compile * Remove unnecessary Suicided check * Don't call dec_sufficients * Handle pre-EIP16...
CWE-770: Allocation of Resources Without Limits or Throttling
CVE-2021-4110
NULL Pointer Dereference in mruby/mruby
mruby is vulnerable to NULL Pointer Dereference
[ { "commit_message": "[PATCH] proc.c: add `mrb_state` argument to `mrb_proc_copy()`. The function may invoke the garbage collection and it requires `mrb_state` to run. include/mruby/proc.h | 2 +- src/class.c | 2 +- src/proc.c | 12 ++++++------ 3 files changed, 8 insertions(+), 8 deletions(-)...
CWE-476 NULL Pointer Dereference
GHSA-fgxc-mxvw-55mv
Jenkins Git Parameter Plugin vulnerable to stored cross-site scripting (XSS)
null
[ { "commit_message": "[PATCH] [SECURITY-1709] .../plugins/gitparameter/GitParameterDefinition.java | 2 +- .../gitparameter/GitParameterDefinition/index.jelly | 8 +++----- .../plugins/gitparameter/javascript/git-parameter.js | 10 +++++----- 3 files changed, 9 insertions(+), 11 deletions(-)", "patch_t...
null
GHSA-2xv9-ghh9-xc69
radashi Allows Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
null
[ { "commit_message": "[PATCH] fix(set): prevent prototype pollution src/mod.ts | 1 + src/object/isDangerousKey.ts | 17 +++++++++++++++++ src/object/set.ts | 6 +++++- tests/object/set.test.ts | 33 ++++++++++++++++++++++++++++----- 4 files changed, 51 insertions(+), 6 deletions(-...
null
GHSA-mhjc-hmmf-jc58
null
[ { "commit_message": "[PATCH] remove strncpy usage as it's effectively useless, replace with an assertion since fn is only used internally (fix #1426) src/jslex.c | 27 ++++++++++++++------------- 1 file changed, 14 insertions(+), 13 deletions(-)", "patch_text_b64": "RnJvbSBiZWQ4NDRmMTA5YjZjMjIyODE2NzQwNTU1MD...
null
CVE-2014-9714
Cross-site scripting (XSS) vulnerability in the WddxPacket::recursiveAddVar function in HHVM (aka the HipHop Virtual Machine) before 3.5.0 allows remote attackers to inject arbitrary web script or HTML via a crafted string to the wddx_serialize_value function.
[ { "commit_message": "[PATCH] HTMLEncode strings in wddx_serialize_value() Summary: Strings returned through wddx_serialize_value should be HTMLEncode()'d during serialization. Fixes #4283 {sync, type=\"child\", parent=\"internal\", parentrevid=\"1691695\", parentrevfbid=\"1537976659780590\", parentdiffid=\"5726...
n/a
CVE-2024-53930
WikiDocs before 1.0.65 allows stored XSS by authenticated users via data that comes after $$\\, which is mishandled by a KaTeX parser.
[ { "commit_message": "[PATCH] adds multiple security features #211 - adds security headers - adds better session cookies - adds session id regeneration to prevent fixation attacks - restricts katex options to prevent cross-site scripting attacks - adds SecurityFilters class to sanitize katex formulas bootstrap.i...
n/a
GHSA-3rh7-494q-3mjq
null
[ { "commit_message": "[PATCH] Fix UAF in comps_objmrtree_unite function The added field is not used at all in many places and it is probably the left-over of some copy-paste. libcomps/src/comps_mradix.c | 2 -- libcomps/src/comps_objmradix.c | 2 -- libcomps/src/comps_objradix.c | 2 -- libcomps/src/comps_radix...
null
GHSA-6363-v5m4-fvq3
timber/timber vulnerable to Deserialization of Untrusted Data
null
[ { "commit_message": "[PATCH] fix: Add patch for PHAR deserialization vulnerability for Timber 2.x (security advisory GHSA-6363-v5m4-fvq3) Co-authored-by: Lukas Gaechter <lukas.gaechter@mind.ch> src/Attachment.php | 5 +++ src/Image/Operation/ToJpg.php | 5 +++ src/Image/Operation/ToWebp.php | 5 ++...
null
CVE-2025-68953
Certain Frappe requests are vulnerable to Path Traversal
Frappe is a full-stack web application framework. Versions 14.99.5 and below and 15.0.0 through 15.80.1 include requests that are vulnerable to path traversal attacks. Arbitrary files from the server could be retrieved due to a lack of proper sanitization on some requests. This issue is fixed in versions 14.99.6 and 15.88.1. To workaround, changing the setup to use a reverse proxy is recommended.
[ { "commit_message": "[PATCH] fix(middleware): check path before returning file Signed-off-by: Akhil Narang <me@akhilnarang.dev> frappe/middlewares.py | 13 +++++++------ 1 file changed, 7 insertions(+), 6 deletions(-)", "patch_text_b64": "RnJvbSAzODY3ZmIxMTJjM2Y3YmUxYTg2M2U0MGYxOWU5MjM1NzE5Zjc4NGZiIE1vbiBTZX...
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
GHSA-c2v4-chx5-vff6
Duplicate Advisory: Integer overflow in cmark-gfm table parsing extension leads to heap memory corruption
null
[ { "commit_message": "[PATCH 1/2] Update cmark-upstream to https://github.com/github/cmark-gfm/commit/ff164f188bc1eb23391c85436ab418463e7a030f ext/commonmarker/cmark-gfm_version.h | 4 ++-- ext/commonmarker/cmark-upstream | 2 +- ext/commonmarker/table.c | 30 ++++++++++++++++++++++++++-- 3 files...
null