id stringlengths 12 19 | title stringlengths 0 237 | description stringlengths 35 3.87k ⌀ | patches listlengths 1 22 | cwe stringlengths 2 440 ⌀ |
|---|---|---|---|---|
GHSA-w26q-7wf7-m5ph | null | [
{
"commit_message": "[PATCH] rds: Fix NULL pointer dereference in __rds_rdma_map MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit This is a fix for syzkaller719569, where memory registration was attempted without any underlying transport being loaded. Analysis of the cas... | null | |
GHSA-pv4p-cwwg-4rph | Django SQL injection vulnerability | null | [
{
"commit_message": "[PATCH] [5.0.x] Fixed CVE-2024-42005 -- Mitigated QuerySet.values() SQL injection attacks against JSON fields. Thanks Eyal (eyalgabay) for the report. django/db/models/sql/query.py | 2 ++ docs/releases/4.2.15.txt | 7 +++++++ docs/releases/5.0.8.txt ... | null |
GHSA-cjcc-p67m-7qxm | Unsafe Reflection in base Component class in yiisoft/yii2 | null | [
{
"commit_message": "[PATCH] Merge pull request from GHSA-cjcc-p67m-7qxm * Fix: Unsafe Reflection in base Component class * Fix style for consistency * add changelog entry * Fix wrong logic * Fix exception message * Update framework/CHANGELOG.md Co-authored-by: Stefano Mtangoo <stefano@hosannahighertech.co.tz> ... | null |
CVE-2017-14767 | The sdp_parse_fmtp_config_h264 function in libavformat/rtpdec_h264.c in FFmpeg before 3.3.4 mishandles empty sprop-parameter-sets values, which allows remote attackers to cause a denial of service (heap buffer overflow) or possibly have unspecified other impact via a crafted sdp file. | [
{
"commit_message": "[PATCH] avformat/rtpdec_h264: Fix heap-buffer-overflow Fixes: rtp_sdp/poc.sdp Found-by: Bingchang <l.bing.chang.bc@gmail.com> Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> libavformat/rtpdec_h264.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)",
"patch_text_b64": "R... | n/a | |
CVE-2020-15225 | Denial of Service vulnerability in django-filter | django-filter is a generic system for filtering Django QuerySets based on user selections. In django-filter before version 2.4.0, automatically generated `NumberFilter` instances, whose value was later converted to an integer, were subject to potential DoS from maliciously input using exponential format with sufficiently large exponents. Version 2.4.0+ applies a `MaxValueValidator` with a a default `limit_value` of 1e50 to the form field used by `NumberFilter` instances. In addition, `NumberFilter` implements the new `get_max_validator()` which should return a configured validator instance to customise the limit, or else `None` to disable the additional validation. Users may manually apply an equivalent validator if they are not able to upgrade. | [
{
"commit_message": "[PATCH] Version 2.4 (#1272) * Added MaxValueValidator to NumberFilter. * Update docs copyright year. * Droped using bumpversion. .bumpversion.cfg | 24 ------------------------ CHANGES.rst | 17 +++++++++++++++++ django_filters/__init__.py | 2 +- django_filters/fi... | CWE-681: Incorrect Conversion between Numeric Types |
CVE-2022-0589 | Cross-site Scripting (XSS) - Stored in librenms/librenms | Cross-site Scripting (XSS) - Stored in Packagist librenms/librenms prior to 22.1.0. | [
{
"commit_message": "[PATCH] XSS fixes (#13780) includes/html/forms/add-dashboard.inc.php | 2 +- includes/html/forms/customoid.inc.php | 6 +++--- includes/html/forms/transport-groups.inc.php | 2 +- 3 files changed, 5 insertions(+), 5 deletions(-)",
"patch_text_b64": "RnJvbSA0YzlkNGVlZmQ4MDY0YTAyOD... | CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
CVE-2019-9162 | In the Linux kernel before 4.20.12, net/ipv4/netfilter/nf_nat_snmp_basic_main.c in the SNMP NAT module has insufficient ASN.1 length checks (aka an array index error), making out-of-bounds read and write operations possible, leading to an OOPS or local privilege escalation. This affects snmp_version and snmp_helper. | [
{
"commit_message": "[PATCH] netfilter: nf_nat_snmp_basic: add missing length checks in ASN.1 cbs The generic ASN.1 decoder infrastructure doesn't guarantee that callbacks will get as much data as they expect; callbacks have to check the `datalen` parameter before looking at `data`. Make sure that snmp_version(... | n/a | |
GHSA-h29f-7f56-j8wh | Sinatra Path Traversal vulnerability | null | [
{
"commit_message": "[PATCH 1/2] add v2.0.1 section in CHANGELOG CHANGELOG.md | 16 ++++++++++++++++ 1 file changed, 16 insertions(+)",
"patch_text_b64": "RnJvbSA5MzIwOGRlYjE3MjM4YWY5ZDlkNmJiOWNkZWJlY2E0NWU3NjI0YzhkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBuYW11c3lha2EgPG5hbXVzeWFrYUBnbWFpbC5jb20+CkRhdGU6IF... | null |
GHSA-m6c6-6vhq-xhvp | null | [
{
"commit_message": "[PATCH] - Fix XSS vulnerability in vbscript: and data:text links handling (#1488850) CHANGELOG | 1 + program/lib/washtml.php | 2 +- tests/MailFunc.php | 14 ++++++++++++++ 3 files changed, 16 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSA3NGNkMGE5YjYyZjExY... | null | |
CVE-2025-59842 | JupyterLab LaTeX typesetter links did not enforce `noopener` attribute | jupyterlab is an extensible environment for interactive and reproducible computing, based on the Jupyter Notebook Architecture. Prior to version 4.4.8, links generated with LaTeX typesetters in Markdown files and Markdown cells in JupyterLab and Jupyter Notebook did not include the noopener attribute. This is deemed to have no impact on the default installations. Theoretically users of third-party LaTeX-rendering extensions could find themselves vulnerable to reverse tabnabbing attacks if links generated by those extensions included target=_blank (no such extensions are known at time of writing) and they were to click on a link generated in LaTeX (typically visibly different from other links). This issue has been patched in version 4.4.8. | [
{
"commit_message": "<5832902+krassowski@users.noreply.github.com> [PATCH] Merge commit from fork * Add tests for hardening of URLs * Harden anchor links for latex rendering, add more tests * Run `mathjax-extension` tests on CI .github/workflows/linuxjs-tests.yml | 1 + packages/mathjax-extension/babe... | CWE-1022: Use of Web Link to Untrusted Target with window.opener Access |
GHSA-p34h-wq7j-h5v6 | python-ldap is Vulnerable to Improper Encoding or Escaping of Output and Improper Null Termination | null | [
{
"commit_message": "[PATCH] Merge commit from fork Update tests to expect \\00 and verify RFC-compliant escaping Lib/ldap/dn.py | 3 ++- Tests/t_ldap_dn.py | 2 +- 2 files changed, 3 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSA2ZWE4MDMyNmEzNGVlNjA5MzIxOTYyOGQ3NjkwYmNlZDUwYzQ5YTNmIE1vbiBTZXA... | null |
CVE-2022-41901 | `CHECK_EQ` fail via input in `SparseMatrixNNZ` in Tensorflow | TensorFlow is an open source platform for machine learning. An input `sparse_matrix` that is not a matrix with a shape with rank 0 will trigger a `CHECK` fail in `tf.raw_ops.SparseMatrixNNZ`. We have patched the issue in GitHub commit f856d02e5322821aad155dad9b3acab1e9f5d693. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. | [
{
"commit_message": "[PATCH] Fix missing sparse matrix crash. Calling a sparse matrix op with no matrix currently causes a crash. Here we check and return a non-ok status. PiperOrigin-RevId: 476379116 tensorflow/core/kernels/sparse/sparse_matrix.h | 7 +++++++ .../linalg/sparse/csr_sparse_matrix_ops_te... | CWE-20: Improper Input Validation |
CVE-2022-1795 | Use After Free in gpac/gpac | Use After Free in GitHub repository gpac/gpac prior to v2.1.0-DEV. | [
{
"commit_message": "[PATCH] fixed #2194 src/bifs/memory_decoder.c | 10 ++++++++-- 1 file changed, 8 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSBjNTM1YmFkNTBkNTgxMmQyN2VlNWIyMmI1NDM3MWJkZGVjNDExNTE0IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBqZWFubGYgPGplYW5sZkBncGFjLmlvPgpEYXRlOiBXZWQsIDE4IE1h... | CWE-416 Use After Free |
GHSA-w2mf-888c-4wj5 | null | [
{
"commit_message": "[PATCH] quoted part can be empty lib/Email/Address.pm | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSA4M2Y4MzA2MTE3MTE1NzI5YWM5MzQ2NTIzNzYyYzBjMzk2MjUxZWI1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBSaWNhcmRvIFNpZ25lcyA8cmpic0BjcGFuLm9yZz4KRGF0ZTogVHVlLCA... | null | |
CVE-2020-36326 | PHPMailer 6.1.8 through 6.4.0 allows object injection through Phar Deserialization via addAttachment with a UNC pathname. NOTE: this is similar to CVE-2018-19296, but arose because 6.1.8 fixed a functionality problem in which UNC pathnames were always considered unreadable by PHPMailer, even in safe contexts. As an unintended side effect, this fix eliminated the code that blocked addAttachment exploitation. | [
{
"commit_message": "[PATCH] Proposed fix for #2069 src/PHPMailer.php | 25 +++++++++++++++++++++---- test/PHPMailerTest.php | 3 +++ 2 files changed, 24 insertions(+), 4 deletions(-)",
"patch_text_b64": "RnJvbSBlMmUwN2EzNTVlZThmZjM2YWJhMjFkMDI0MmM1OTUwYzU2ZTRjNmY5IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9... | n/a | |
CVE-2022-45182 | Pi-Star_DV_Dash (for Pi-Star DV) before 5aa194d mishandles the module parameter. | [
{
"commit_message": "[PATCH] Update link_manager.php Fix #169 dstarrepeater/link_manager.php | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSAxZTQ2NTMzZjQwNTE2NDhiYzQwNDc4ZDk5MjAxZjE5MjQxYmJhYTQxIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBNVzBNV1ogPDY2MDY1OTA0K01XME1XWkB1c2V... | n/a | |
GHSA-75jx-pcxc-2v2f | null | [
{
"commit_message": "[PATCH] (for 4.9.3) CVE-2018-14468/FRF.16: Add a missing length check. The specification says in a well-formed Magic Number information element the data is exactly 4 bytes long. In mfr_print() check this before trying to read those 4 bytes. This fixes a buffer over-read discovered by Bharga... | null | |
CVE-2016-10969 | The supportflow plugin before 0.7 for WordPress has XSS via a discussion ticket title. | [
{
"commit_message": "[PATCH] Admin: Escape ticket title on Discussion screen to avoid XSS. If `run_wptexturize` is disabled, the following subject title would allow an attacker to perform cross-site scripting: `\"><script>alert('hi');</script>` That attack has a CVSS score of 4.7 - https://www.first.org/cvss/ca... | n/a | |
CVE-2011-1833 | Race condition in the ecryptfs_mount function in fs/ecryptfs/main.c in the eCryptfs subsystem in the Linux kernel before 3.1 allows local users to bypass intended file permissions via a mount.ecryptfs_private mount with a mismatched uid. | [
{
"commit_message": "[PATCH] Ecryptfs: Add mount option to check uid of device being mounted = expect uid Close a TOCTOU race for mounts done via ecryptfs-mount-private. The mount source (device) can be raced when the ownership test is done in userspace. Provide Ecryptfs a means to force the uid check at mount... | n/a | |
GHSA-p66q-ppwr-q5j8 | LibreNMS has a Stored XSS ('Cross-site Scripting') in librenms/includes/html/dev-overview-data.inc.php | null | [
{
"commit_message": "[PATCH] Fixed XSS issue with Device overview page and overwrite_ip (#16567) * Fixed XSS issue with Device overview page and overwrite_ip * Added htmlentities() to more output includes/html/dev-overview-data.inc.php | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-)",
"patch_text... | null |
CVE-2012-2133 | Use-after-free vulnerability in the Linux kernel before 3.3.6, when huge pages are enabled, allows local users to cause a denial of service (system crash) or possibly gain privileges by interacting with a hugetlbfs filesystem, as demonstrated by a umount operation that triggers improper handling of quota data. | [
{
"commit_message": "[PATCH] hugepages: fix use after free bug in \"quota\" handling hugetlbfs_{get,put}_quota() are badly named. They don't interact with the general quota handling code, and they don't much resemble its behaviour. Rather than being about maintaining limits on on-disk block usage by particular... | n/a | |
CVE-2021-41099 | Integer overflow issue with strings in Redis | Redis is an open source, in-memory database that persists on disk. An integer overflow bug in the underlying string library can be used to corrupt the heap and potentially result with denial of service or remote code execution. The vulnerability involves changing the default proto-max-bulk-len configuration parameter to a very large value and constructing specially crafted network payloads or commands. The problem is fixed in Redis versions 6.2.6, 6.0.16 and 5.0.14. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from modifying the proto-max-bulk-len configuration parameter. This can be done using ACL to restrict unprivileged users from using the CONFIG SET command. | [
{
"commit_message": "[PATCH] Fix integer overflow in _sdsMakeRoomFor (CVE-2021-41099) src/sds.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-)",
"patch_text_b64": "RnJvbSBjNmFkODc2Nzc0ZjNjYzExZTMyNjgxZWEwMmEyZWVhZDAwZjJjNTIxIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBZaXl1YW5HVU8gPHlndW9hekBnbWFp... | CWE-190: Integer Overflow or Wraparound |
GHSA-qc53-44cj-vfvx | Denial of Service in Tensorflow | null | [
{
"commit_message": "[PATCH] Fix multiple vulnerabilities in `tf.raw_ops.*CountSparseOutput`. Also add tests for these API points, both for the happy paths and for the vulnerable ones. PiperOrigin-RevId: 332563222 Change-Id: Ib3b52116a83a134c2e742a7c66e5e956db8fba05 tensorflow/core/kernels/count_ops.cc | ... | null |
GHSA-hhx9-p69v-cx2j | Authentication bypass in Apache Airflow | null | [
{
"commit_message": "[PATCH] Change default auth for experimental backend to deny_all (#9611) In a move that should surprise no one, a number of users do not read, and leave the API wide open by default. Safe is better than powned (cherry picked from commit 9e305d6b810a2a21e2591a80a80ec41acb3afed0) UPDATING.md ... | null |
GHSA-qqqw-gm93-qf6m | OS Command Injection in Snyk gradle plugin | null | [
{
"commit_message": "[PATCH] feat: handle gradle wrapper files for windows (#292) * feat: handle gradle wrapper files for windows * feat: updated test wrapper tests * feat: add test for generateWrapperProcessArgs * fix: lint files lib/index.ts | 44 +++++++++++++++---- lib/sub-pr... | null |
CVE-2016-9464 | Nextcloud Server before 9.0.54 and 10.0.0 suffers from an improper authorization check on removing shares. The Sharing Backend as implemented in Nextcloud does differentiate between shares to users and groups. In case of a received group share, users should be able to unshare the file to themselves but not to the whole group. The previous API implementation simply unshared the file to all users in the group. | [
{
"commit_message": "[PATCH] Do not allow to delete/update group shares as a group member apps/files_sharing/lib/API/Share20OCS.php | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-)",
"patch_text_b64": "RnJvbSA3Mjg5Y2I1ZWMwYjgxMjk5MmFiMGRmYjg4OTc0NGI5NGJjMDk5NGYwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQ... | Improper Authorization (CWE-285) | |
GHSA-r87w-47m8-22w3 | Template Injection in jsrender | null | [
{
"commit_message": "[PATCH] Commit 74 (v0.9.74 - Beta) Updates and new documentation topics: - Important updates and improvements to $.views.settings APIs: settings.allowCode(), settings.delimiters(), settings.debugMode() plus new settings.advanced(). See new documentation at www.jsviews.com/#settings - Suppor... | null |
CVE-2018-20169 | An issue was discovered in the Linux kernel before 4.19.9. The USB subsystem mishandles size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c. | [
{
"commit_message": "[PATCH] USB: check usb_get_extra_descriptor for proper size When reading an extra descriptor, we need to properly check the minimum and maximum size allowed, to prevent from invalid data being sent by a device. Reported-by: Hui Peng <benquike@gmail.com> Reported-by: Mathias Payer <mathias.p... | n/a | |
GHSA-9hfg-7492-qqv8 | null | [
{
"commit_message": "[PATCH] nfp: flower: prevent memory leak in nfp_flower_spawn_phy_reprs In nfp_flower_spawn_phy_reprs, in the for loop over eth_tbl if any of intermediate allocations or initializations fail memory is leaked. requiered releases are added. Fixes: b94524529741 (\"nfp: flower: add per repr priv... | null | |
CVE-2021-29455 | Missing validation of JWT signature in `grassrootza/grassroot-platform` | Grassroot Platform is an application to make it faster, cheaper and easier to persistently organize and mobilize people in low-income communities. Grassroot Platform before master deployment as of 2021-04-16 did not properly verify the signature of JSON Web Tokens when refreshing an existing JWT. This allows to forge a valid JWT. The problem has been patched in version 1.3.1 by deprecating the JWT refresh function, which was an overdue deprecation regardless (the "refresh" flow is no longer used). | [
{
"commit_message": "[PATCH] Removing deprecated refresh function .../authentication/JwtService.java | 7 ----- .../authentication/JwtServiceImpl.java | 27 ------------------- .../AuthenticationController.java | 14 ---------- 3 files changed, 48 deletions(-)",
"patch_text_b64":... | {"CWE-347":"Improper Verification of Cryptographic Signature"} |
CVE-2022-0558 | Cross-site Scripting (XSS) - Stored in microweber/microweber | Cross-site Scripting (XSS) - Stored in Packagist microweber/microweber prior to 1.2.11. | [
{
"commit_message": "[PATCH] xss fix on tagging module src/MicroweberPackages/Helper/HTMLClean.php | 12 ++++++++++++ userfiles/modules/tags/TaggingTagsManager.php | 4 +++- 2 files changed, 15 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSAxNGExYmI5NzFiY2I4YjU0NTZjMmJmMDAyMGMzMDE4OTA3YTI3MDRkIE1... | CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
GHSA-2mm7-x5h6-5pvq | Moby (Docker Engine) started with non-empty inheritable Linux process capabilities | null | [
{
"commit_message": "[PATCH] oci: inheritable capability set should be empty The Linux kernel never sets the Inheritable capability flag to anything other than empty. Moby should have the same behavior, and leave it to userspace code within the container to set a non-empty value if desired. Reported-by: Andrew... | null |
CVE-2013-5705 | apache2/modsecurity.c in ModSecurity before 2.7.6 allows remote attackers to bypass rules by using chunked transfer coding with a capitalized Chunked value in the Transfer-Encoding HTTP header. | [
{
"commit_message": "[PATCH] Fix Chunked string case sensitive issue - CVE-2013-5705 apache2/modsecurity.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSBmOGQ0NDFjZDI1MTcyZmRmZTViNjEzNDQyZmVkZmMwZGEzY2MzMzNkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBCcmVubyBTaWx2YSA8YnJlbm8... | n/a | |
CVE-2025-47942 | Learners on edX Platform can download python_lib.zip | The Open edX Platform is a learning management platform. Prior to commit 6740e75c0fdc7ba095baf88e9f5e4f3e15cfd8ba, edxapp has no built-in protection against downloading the python_lib.zip asset from courses, which is a concern since it often contains custom grading code or answers to course problems. This potentially affects any course using custom Python-graded problem blocks. The openedx/configuration repo has had a patch since 2016 in the form of an nginx rule, but this was only intended as a temporary mitigation. As the configuration repo has been deprecated and we have not been able to locate any similar protection in Tutor, it is likely that most deployments have no protection against python_lib.zip being downloaded. The recommended mitigation, implemented in commit 6740e75c0fdc7ba095baf88e9f5e4f3e15cfd8ba, restricts python_lib.zip downloads to just the course team and site staff/superusers. | [
{
"commit_message": "[PATCH] Merge commit from fork Allow overriding but prevent download by default. Also, extract `PYTHON_LIB_FILENAME` Django setting as a shared function and document the setting. .../contentstore/tests/test_import.py | 3 +- common/test/data/toy/static/python_lib.zip | Bin 0 -> ... | CWE-862: Missing Authorization |
CVE-2023-22728 | Silverstripe Framework has missing permission check of canView in GridFieldPrintButton | Silverstripe Framework is the Model-View-Controller framework that powers the Silverstripe content management system. Prior to version 4.12.15, the GridField print view incorrectly validates the permission of DataObjects potentially allowing a content author to view records they are not authorised to access. Users should upgrade to Silverstripe Framework 4.12.15 or above to address the issue. | [
{
"commit_message": "[PATCH] [CVE-2023-22728] Check canView before printing from GridField src/Forms/GridField/GridFieldPrintButton.php | 24 ++++++++++--------- .../GridField/GridFieldPrintButtonTest.php | 16 +++++++++++-- .../GridFieldPrintButtonTest/TestObject.php | 7 ++++++ 3 files changed, 34 inserti... | CWE-862: Missing Authorization |
CVE-2024-27092 | Content spoofing - real Hoppscotch emails | Hoppscotch is an API development ecosystem. Due to lack of validation for fields like Label (Edit Team) - TeamName, bad actors can send emails with Spoofed Content as Hoppscotch. Part of payload (external link) is presented in clickable form - easier to achieve own goals by malicious actors. This issue is fixed in 2023.12.6. | [
{
"commit_message": "[PATCH] refactor: possible links in email templates do not highlight (#3851) .../src/mailer/mailer.service.ts | 2 +- .../src/mailer/templates/team-invitation.hbs | 10 +- .../src/mailer/templates/user-invitation.hbs | 120 +++++++++--------- 3 files changed, 72 insertions(+)... | CWE-20: Improper Input Validation |
CVE-2023-37307 | In MISP before 2.4.172, title_for_layout is not properly sanitized in Correlations, CorrelationExclusions, and Layouts. | [
{
"commit_message": "[PATCH] fix: [layout:title] Make sure page title are correctly formatted app/View/CorrelationExclusions/top_correlations.ctp | 2 +- app/View/Correlations/over_correlations.ctp | 2 +- app/View/Correlations/top.ctp | 2 +- app/View/Layouts/Emails/html/default.ctp ... | n/a | |
GHSA-g3cm-qg2v-2hj5 | pyLoad open redirect vulnerability due to improper validation of the is_safe_url function | null | [
{
"commit_message": "[PATCH] fix GHSA-g3cm-qg2v-2hj5 security advisory .../webui/app/blueprints/app_blueprint.py | 10 +++--- src/pyload/webui/app/helpers.py | 34 +++++++++++-------- 2 files changed, 24 insertions(+), 20 deletions(-)",
"patch_text_b64": "RnJvbSBmZTk0NDUxZGNjMmJlOTBiMzg4OWUy... | null |
GHSA-qcjq-7f7v-pvc8 | Nginx-UI vulnerable to authenticated RCE through injecting into the application config via CRLF | null | [
{
"commit_message": "[PATCH] fix: taking 100% CPU if the log file is not a regular file api/nginx/nginx_log.go | 23 ++++++++++++++++++----- app/src/version.json | 2 +- app/version.json | 2 +- resources/demo/app.ini | 2 +- 4 files changed, 21 insertions(+), 8 deletions(-)",
"patch_text_b64": "RnJv... | null |
CVE-2023-49086 | Cacti is vulnerable to cross-Site scripting (XSS) DOM | Cacti is a robust performance and fault management framework and a frontend to RRDTool - a Time Series Database (TSDB). A vulnerability in versions prior to 1.2.27 bypasses an earlier fix for CVE-2023-39360, therefore leading to a DOM XSS attack. Exploitation of the vulnerability is possible for an authorized user. The vulnerable component is the `graphs_new.php`. The impact of the vulnerability is execution of arbitrary JavaScript code in the attacked user's browser. This issue has been patched in version 1.2.27. | [
{
"commit_message": "[PATCH] QA: Fix 2 of 3 - Commits for CVE-2023-49088 and CVE-2023-48086 Missed here https://github.com/Cacti/cacti/security/advisories/GHSA-q7g7-gcf6-wh4x and here: https://github.com/Cacti/cacti/security/advisories/GHSA-wc73-r2vw-59pr data_debug.php | 2 +- graphs_new.php | 20 +++++++++++++... | CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
GHSA-mpj8-q39x-wq5h | crypto-es PBKDF2 1,000 times weaker than specified in 1993 and 1.3M times weaker than current standard | null | [
{
"commit_message": "[PATCH] v2.1.0 CHANGELOG.md | 6 ++++++ __tests__/debug.js | 13 +++++++++---- __tests__/pbkdf2.test.ts | 28 ++++++++++++++-------------- lib/pbkdf2.js | 13 ++++++++----- package-lock.json | 2 +- package.json | 2 +- 6 files changed, 39 insert... | null |
CVE-2019-20919 | An issue was discovered in the DBI module before 1.643 for Perl. The hv_fetch() documentation requires checking for NULL and the code does that. But, shortly thereafter, it calls SvOK(profile), causing a NULL pointer dereference. | [
{
"commit_message": "[PATCH] Fix a NULL profile dereference in dbi_profile() hv_fetch() documentation requires checking for NULL and the code does that. But then calls SvOK(profile) uncoditionally two lines later. This patch fixes it. DBI.xs | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-)",
"pa... | n/a | |
GHSA-f8pq-3926-8gx5 | Unsanitized user controlled input in module generation | null | [
{
"commit_message": "[PATCH] chore(deps): update all patch versions (#4043) .../packages/exporter-logs-otlp-grpc/package.json | 2 +- .../packages/exporter-logs-otlp-http/package.json | 2 +- .../packages/exporter-logs-otlp-proto/package.json | 2 +- .../packages/exporter-trace-otlp-grpc/pac... | null |
GHSA-6mv9-x42q-f8qh | null | [
{
"commit_message": "[PATCH] Fix XSS with data:html links and form actions. The academically correct way to filter out xlink hrefs should have been to use hasAttributeNS/getAttributeNS with the XLink namespace. But from my testing browsers don't care about that namespace at all, and only use the xlink: prefix. ... | null | |
CVE-2016-10207 | The Xvnc server in TigerVNC allows remote attackers to cause a denial of service (invalid memory access and crash) by terminating a TLS handshake early. | [
{
"commit_message": "[PATCH] Proper global init/deinit of GnuTLS These are reference counted so it is important to retain symmetry between the calls. Failure to do so will result in bad memory access and crashes. common/rfb/CSecurityTLS.cxx | 19 +++++-------------- common/rfb/CSecurityTLS.h | 2 -- common/rfb... | n/a | |
GHSA-8xx9-rxrj-2m2w | Cross-site Scripting in pimcore | null | [
{
"commit_message": "[PATCH] [Classification Store] Properly escape values on grids & titles .../DataObject/ClassificationstoreController.php | 6 +++--- .../public/js/pimcore/helpers/generic-grid.js | 2 +- .../object/classificationstore/collectionsPanel.js | 14 +++++++++----- .../object/classifications... | null |
CVE-2023-46121 | Generic Extractor MITM Vulnerability in yt-dlp | yt-dlp is a youtube-dl fork with additional features and fixes. The Generic Extractor in yt-dlp is vulnerable to an attacker setting an arbitrary proxy for a request to an arbitrary url, allowing the attacker to MITM the request made from yt-dlp's HTTP session. This could lead to cookie exfiltration in some cases. Version 2023.11.14 removed the ability to smuggle `http_headers` to the Generic extractor, as well as other extractors that use the same pattern. Users are advised to upgrade. Users unable to upgrade should disable the Ggneric extractor (or only pass trusted sites with trusted content) and ake caution when using `--no-check-certificate`. | [
{
"commit_message": "[PATCH] [ie] Do not smuggle `http_headers` See: https://github.com/yt-dlp/yt-dlp/security/advisories/GHSA-3ch3-jhc6-5r8x Authored by: coletdjnz test/test_networking.py | 4 ++++ yt_dlp/extractor/cybrary.py | 2 +- yt_dlp/extractor/duboku.py | 2 +- yt_dlp/extractor/embedly.py ... | CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') |
GHSA-hj4w-hm2g-p6w5 | vLLM Vulnerable to Remote Code Execution via Mooncake Integration | null | [
{
"commit_message": "[PATCH] [Security] Use safe serialization and fix zmq setup for mooncake pipe (#17192) Signed-off-by: Shangming Cai <caishangming@linux.alibaba.com> Co-authored-by: Shangming Cai <caishangming@linux.alibaba.com> .../kv_transfer/kv_pipe/mooncake_pipe.py | 21 ++++++++++++------- 1 file c... | null |
CVE-2022-2304 | Stack-based Buffer Overflow in vim/vim | Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0. | [
{
"commit_message": "[PATCH] patch 9.0.0035: spell dump may go beyond end of an array Problem: Spell dump may go beyond end of an array. Solution: Limit the word length. src/spell.c | 5 +++-- src/testdir/test_spell.vim | 12 ++++++++++++ src/version.c | 2 ++ 3 files changed, 17... | CWE-121 Stack-based Buffer Overflow |
CVE-2020-12465 | An array overflow was discovered in mt76_add_fragment in drivers/net/wireless/mediatek/mt76/dma.c in the Linux kernel before 5.5.10, aka CID-b102f0c522cf. An oversized packet with too many rx fragments can corrupt memory of adjacent pages. | [
{
"commit_message": "[PATCH] mt76: fix array overflow on receiving too many fragments for a packet If the hardware receives an oversized packet with too many rx fragments, skb_shinfo(skb)->frags can overflow and corrupt memory of adjacent pages. This becomes especially visible if it corrupts the freelist pointe... | n/a | |
GHSA-h8cp-ph26-xwmv | null | [
{
"commit_message": "[PATCH] Fix a double free in the List functions The code was set up so that it would free the individual items and the data in `freeListData`, but there was already a Go `defer` to free the data item, resulting in a double free. Remove the `free` in `freeListData` and leave the original one... | null | |
CVE-2025-27497 | OpenDJ Denial of Service (Dos) using alias loop | OpenDJ is an LDAPv3 compliant directory service. OpenDJ prior to 4.9.3 contains a denial-of-service (DoS) vulnerability that causes the server to become unresponsive to all LDAP requests without crashing or restarting. This issue occurs when an alias loop exists in the LDAP database. If an ldapsearch request is executed with alias dereferencing set to "always" on this alias entry, the server stops responding to all future requests. Fortunately, the server can be restarted without data corruption. This vulnerability is fixed in 4.9.3. | [
{
"commit_message": "[PATCH] CVE-2025-27497 Fix Denial of Service (Dos) using alias loop .../LocalBackendSearchOperation.java | 22 +++- .../opendj/AliasTestCase.java | 101 +++++++++++++++++- 2 files changed, 116 insertions(+), 7 deletions(-)",
"patch_text_b64": "RnJvbSAwOGFlZTQ3MjQ... | CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') |
CVE-2013-2094 | The perf_swevent_init function in kernel/events/core.c in the Linux kernel before 3.8.9 uses an incorrect integer data type, which allows local users to gain privileges via a crafted perf_event_open system call. | [
{
"commit_message": "[PATCH] perf: Treat attr.config as u64 in perf_swevent_init() Trinity discovered that we fail to check all 64 bits of attr.config passed by user space, resulting to out-of-bounds access of the perf_swevent_enabled array in sw_perf_event_destroy(). Introduced in commit b0a873ebb (\"perf: Reg... | n/a | |
CVE-2022-41418 | An issue in the component BlogEngine/BlogEngine.NET/AppCode/Api/UploadController.cs of BlogEngine.NET v3.3.8.0 allows attackers to execute arbitrary code via uploading a crafted PNG file. | [
{
"commit_message": "[PATCH 1/3] Added 'SameSite=Strict' cookie attribute, reducing overall CSRF attack surface BlogEngine/BlogEngine.NET/Global.asax | 13 +++++++++++++ 1 file changed, 13 insertions(+)",
"patch_text_b64": "RnJvbSA0MDMzYzcyZmVmOGIzZDkyZTYzMjk2NzVhYjQwY2U1NWJlYjMyYzlhIE1vbiBTZXAgMTcgMDA6MDA6M... | n/a | |
GHSA-7gfx-wxfh-7rvm | Smarty Path Traversal Vulnerability | null | [
{
"commit_message": "[PATCH] - bugfix regarding Security Vulnerability did not solve the problem under Linux libs/Smarty.class.php | 44 ++++++++--------------------- libs/sysplugins/smarty_security.php | 2 +- 2 files changed, 13 insertions(+), 33 deletions(-)",
"patch_text_b64": "RnJvbSAyZTA... | null |
CVE-2023-4681 | NULL Pointer Dereference in gpac/gpac | NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.3-DEV. | [
{
"commit_message": "[PATCH] fixed #2575 src/filters/dasher.c | 6 ++++++ src/media_tools/avilib.c | 26 +++++++++++++++++--------- src/media_tools/mpeg2_ps.c | 3 ++- 3 files changed, 25 insertions(+), 10 deletions(-)",
"patch_text_b64": "RnJvbSA0YmFjMTlhZDg1NDE1OWIyMWJhNzBkOGFiN2M0ZTFjZDFkYjhlYTFjI... | CWE-476 NULL Pointer Dereference |
GHSA-qr7g-c8hf-wr2j | null | [
{
"commit_message": "[PATCH] [#20653] SQL Injection: $phrase is escaped now, yet most of the plugins have to be updated according to plugin_content_title.php git-svn-id: http://joomlacode.org/svn/titlelink@27 de31ee7e-3f2c-0410-b67e-83f64df8b4ac j_1_5_x/plugin/changelog.php | 5 +++++ ... | null | |
GHSA-mhrh-rmp8-f5c5 | null | [
{
"commit_message": "[PATCH] Build88 - Fixed SH file exploit SECURITY.md | 13 +++++++++---- app/src/main/AndroidManifest.xml | 1 + app/src/main/assets/html/changelogs.html | 3 +++ .../inure/activities/association/BashAssociation.kt | 5 +++... | null | |
GHSA-qf6x-7g55-4wgc | null | [
{
"commit_message": "[PATCH] mhas: check idx not oob (#2398) src/filters/reframe_mhas.c | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-)",
"patch_text_b64": "RnJvbSBiZTlmOGQzOTViYmQxOTZlMzgxMmU5Y2Q4MDcwOGYwNmJjYzIwNmY3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBdXJlbGllbiBEYXZpZCA8YXVyZWxpZW4uZGF2a... | null | |
CVE-2025-10096 | SimStudioAI sim route.ts server-side request forgery | A vulnerability was determined in SimStudioAI sim up to 1.0.0. This affects an unknown function of the file apps/sim/app/api/files/parse/route.ts. Executing manipulation of the argument filePath can lead to server-side request forgery. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. This patch is called 3424a338b763115f0269b209e777608e4cd31785. Applying a patch is advised to resolve this issue. | [
{
"commit_message": "[PATCH] fix(security): fixed SSRF vulnerability (#1149) apps/sim/app/api/proxy/image/route.ts | 14 +- apps/sim/app/api/proxy/route.ts | 20 +- apps/sim/lib/security/url-validation.test.ts | 712 +++++++++++++++++++ apps/sim/lib/security/url-validation.ts | 210 +++++... | Server-Side Request Forgery |
GHSA-fw6g-56pg-38xh | null | [
{
"commit_message": "[PATCH] ping: prevent NULL pointer dereference on write to msg_name A plain read() on a socket does set msg->msg_name to NULL. So check for NULL pointer first. Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org> Signed-off-by: David S. Miller <davem@davemloft.net> net/ipv4/ping... | null | |
CVE-2021-44674 | An information exposure issue has been discovered in Opmantek Open-AudIT 4.2.0. The vulnerability allows an authenticated attacker to read file outside of the restricted directory. | [
{
"commit_message": "[PATCH] Fix for image upload path traversal issue. code_igniter/application/controllers/devices.php | 11 ++--------- code_igniter/application/models/m_devices.php | 2 +- 2 files changed, 3 insertions(+), 10 deletions(-)",
"patch_text_b64": "RnJvbSBkMjdiNjQ5MjgzYWE2YTAxYTE1ZTVhM2RmMT... | n/a | |
GHSA-xc85-32mf-xpv8 | Rack arbitrary code execution via timing attack | null | [
{
"commit_message": "[PATCH] Use secure_compare for hmac comparison * Closes CVE-2013-0263 lib/rack/session/cookie.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSAwY2Q3ZTlhYTM5N2Y4ZWJiM2I4NDgxZDY3ZGJhYzhiNDg2M2E3ZjA3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBKYW1lcyBUdWNr... | null |
GHSA-68xg-gqqm-vgj8 | Puma HTTP Request/Response Smuggling vulnerability | null | [
{
"commit_message": "[PATCH] Merge pull request from GHSA-68xg-gqqm-vgj8 * Reject empty string for Content-Length * Ignore trailers in last chunk * test_puma_server.rb - use heredoc, test_cl_and_te_smuggle * client.rb - stye/RubyCop * test_puma_server.rb - indented heredoc rubocop disable * Dentarg comments * R... | null |
GHSA-4f8m-x9c7-gvcq | null | [
{
"commit_message": "[PATCH] Database: Hardening for `wpdb::prepare()` Previously if you passed an array of values for placeholders, additional values could be passed as well. Now additional values will be ignored. Built from https://develop.svn.wordpress.org/trunk@41470 git-svn-id: http://core.svn.wordpress.or... | null | |
GHSA-x832-r2rj-4g5p | SSRF in Kitodo.Presentation | null | [
{
"commit_message": "[PATCH 1/2] Security fix and preparation for release 2.3.2 - please update! Documentation/Settings.yml | 2 +- common/class.tx_dlf_helper.php | 20 ++ ext_conf_template.txt | 3 + ext_emconf.php | 2... | null |
GHSA-mm9p-48xr-prf2 | null | [
{
"commit_message": "[PATCH] aio: mark AIO pseudo-fs noexec This ensures that do_mmap() won't implicitly make AIO memory mappings executable if the READ_IMPLIES_EXEC personality flag is set. Such behavior is problematic because the security_mmap_file LSM hook doesn't catch this case, potentially permitting an ... | null | |
GHSA-frq9-3hp2-xvxg | Markdownify MCP Server allows Server-Side Request Forgery (SSRF) via the Markdownify.get() function | null | [
{
"commit_message": "[PATCH 1/2] Added URL validation to avoid SSRF issues when transforming URLs package.json | 5 ++++- pnpm-lock.yaml | 45 +++++++++++++++++++++++++++++++++++++++++++++ src/server.ts | 8 ++++++++ 3 files changed, 57 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSAzMTY2ZDg2ZGJ... | null |
GHSA-gfmf-37px-c964 | null | [
{
"commit_message": "[PATCH] Multi-realm KDC null deref [CVE-2013-1418] If a KDC serves multiple realms, certain requests can cause setup_server_realm() to dereference a null pointer, crashing the KDC. CVSSv2: AV:N/AC:M/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C A related but more minor vulnerability requires authentica... | null | |
GHSA-p66x-2cv9-qq3v | Arbitrary code execution in Apache Commons BeanUtils | null | [
{
"commit_message": "[PATCH] BEANUTILS-520: mitigation for CVE-2014-0114 pom.xml | 10 ++++ src/changes/changes.xml | 6 ++ .../commons/beanutils/PropertyUtilsBean.java | 1 + .../BeanIntrospectionDataTestCase.java | 1 + .../beanutils/bugs/Jira... | null |
CVE-2014-3994 | Cross-site scripting (XSS) vulnerability in util/templatetags/djblets_js.py in Djblets before 0.7.30 and 0.8.x before 0.8.3 for Django, as used in Review Board, allows remote attackers to inject arbitrary web script or HTML via a JSON object, as demonstrated by the name field when changing a user name. | [
{
"commit_message": "[PATCH] Fix a XSS vulnerability with bad input to json_dumps. Django's JSON serialization does not handle escaping of any characters to make them safe for injecting into HTML. This allows an attacker who can provide part of a JSON-serializable object to craft a string that can break out of ... | n/a | |
PYSEC-2021-554 | null | [
{
"commit_message": "[PATCH] Fix heap OOB in `tf.raw_ops.RaggedGather` PiperOrigin-RevId: 388355464 Change-Id: If14d96231d1cd7aad7c4d1c22c1bab1576b75717 tensorflow/core/kernels/ragged_gather_op.cc | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSBhMmI3NDNmNjAxN2Q3Yjk3YW... | null | |
CVE-2021-38202 | fs/nfsd/trace.h in the Linux kernel before 5.13.4 might allow remote attackers to cause a denial of service (out-of-bounds read in strlen) by sending NFS traffic when the trace event framework is being used for nfsd. | [
{
"commit_message": "[PATCH] NFSD: Prevent a possible oops in the nfs_dirent() tracepoint The double copy of the string is a mistake, plus __assign_str() uses strlen(), which is wrong to do on a string that isn't guaranteed to be NUL-terminated. Fixes: 6019ce0742ca (\"NFSD: Add a tracepoint to record directory ... | n/a | |
CVE-2022-1931 | Incorrect Synchronization in polonel/trudesk | Incorrect Synchronization in GitHub repository polonel/trudesk prior to 1.2.3. | [
{
"commit_message": "[PATCH] fix(messages): validation check .../containers/Tickets/TicketsContainer.jsx | 1 - src/controllers/api/v1/messages.js | 33 ++++-- src/public/js/pages/messages.js | 105 ++++++++---------- 3 files changed, 71 insertions(+), 68 deletions(-)",
"patch_tex... | CWE-821 Incorrect Synchronization |
CVE-2024-45803 | Cross site scripting (XSS) Vulnerability on route /wireui/button?label=Content in wireui | Wire UI is a library of components and resources to empower Laravel and Livewire application development. A potential Cross-Site Scripting (XSS) vulnerability has been identified in the `/wireui/button` endpoint, specifically through the `label` query parameter. Malicious actors could exploit this vulnerability by injecting JavaScript into the `label` parameter, leading to the execution of arbitrary code in the victim's browser. The `/wireui/button` endpoint dynamically renders button labels based on user-provided input via the `label` query parameter. Due to insufficient sanitization or escaping of this input, an attacker can inject malicious JavaScript. By crafting such a request, an attacker can inject arbitrary code that will be executed by the browser when the endpoint is accessed. If exploited, this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the affected website. This could lead to: **Session Hijacking**: Stealing session cookies, tokens, or other sensitive information. **User Impersonation**: Performing unauthorized actions on behalf of authenticated users. **Phishing**: Redirecting users to malicious websites. **Content Manipulation**: Altering the appearance or behavior of the affected page to mislead users or execute further attacks. The severity of this vulnerability depends on the context of where the affected component is used, but in all cases, it poses a significant risk to user security. This issue has been addressed in release versions 1.19.3 and 2.1.3. Users are advised to upgrade. There are no known workarounds for this vulnerability. | [
{
"commit_message": "[PATCH 01/10] refactor button controller - remove custom blade compiler - remove safe eval - use laravel blade to render the view src/Http/Controllers/ButtonController.php | 27 ++++------- src/Support/BladeCompiler.php | 46 ------------------- src/Support/SafeEval.php ... | CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
CVE-2022-25354 | Prototype Pollution | The package set-in before 2.0.3 are vulnerable to Prototype Pollution via the setIn method, as it allows an attacker to merge object prototypes into it. **Note:** This vulnerability derives from an incomplete fix of [CVE-2020-28273](https://security.snyk.io/vuln/SNYK-JS-SETIN-1048049) | [
{
"commit_message": "[PATCH] better fix for prototype pollution vulnerability cheers Idan Digmi of Snyk Security index.js | 21 +- package-lock.json | 3357 ++++++++++++++++++++++++++++++++++++++++++++- test/index.js | 8 +- 3 files changed, 3359 insertions(+), 27 deletions(-)",
"patch_text_b... | Prototype Pollution |
GHSA-h46p-wf26-6wcw | null | [
{
"commit_message": "[PATCH] iio: imu: adis16400: release allocated memory on failure In adis_update_scan_mode, if allocation for adis->buffer fails, previously allocated adis->xfer needs to be released. Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com> Reviewed-by: Alexandru Ardelean <alexandru.ardele... | null | |
GHSA-c53x-wwx2-pg96 | Cross-Site Scripting in @berslucas/liljs | null | [
{
"commit_message": "[PATCH] Use textContent over innerHTML so you can bind untrusted text values without the possibility of an XSS attack. src/liljs.js | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSA3NzljMGRjZDhhYmE0MzRhMWM5NGRiN2QxZDJkOTkwYTYyOWY5YTZjIE1vbiBTZXAgMTcgM... | null |
CVE-2019-1010308 | Aquaverde GmbH Aquarius CMS prior to version 4.1.1 is affected by: Incorrect Access Control. The impact is: The access to the log file is not restricted. It contains sensitive information like passwords etc. The component is: log file. The attack vector is: open the file. | [
{
"commit_message": "[PATCH] allow login without password in DEV mode backend/backend.php | 5 +++-- config.base.php | 10 ++++++++++ config.override.php | 3 ++- lib/db/Users.php | 11 +++++++++-- 4 files changed, 24 insertions(+), 5 deletions(-)",
"patch_text_b64": "RnJvbSBlMWFmODlhYTlkZjA3ZWEyNjVkOD... | Incorrect Access Control | |
GHSA-fhw8-8v9p-7jp7 | BBOT's various issues in unarchive.py can cause arbitrary file write and RCE | null | [
{
"commit_message": "[PATCH] abort unarchival if dest dir already exists bbot/modules/internal/unarchive.py | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSA2MzI1ZjJmNGY4ZjZmNDU0NTcwM2U0YzliODAwNGU2OWY3MWJlYzgyIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBUaGVUZWNocm9tYW5... | null |
GHSA-f58f-h8w5-jgjr | null | [
{
"commit_message": "[PATCH] Always check password to avoid timing side channel attacks in REST2 basic auth This addresses CVE-2021-38562. lib/RT/REST2/Middleware/Auth.pm | 9 +++++++++ 1 file changed, 9 insertions(+)",
"patch_text_b64": "RnJvbSA3MDc0OWJiNjZjYjEzZGQ3MGJkNTMzNDBjMzcxMDM4YTVmM2NhNTdjIE1vbiBTZX... | null | |
GHSA-5vmp-m5v2-hx47 | tough root metadata version is not checked for sequential versioning | null | [
{
"commit_message": "[PATCH] tough: enforce root metadata validation Update metadata validation: must not skip versions, must measure expiration relative to start of update. TUF specification v1.0.33, sections 5.1 and 5.3.5. tough/src/lib.rs | 78 +++++++++++++++++++++++++----------------------- 1 file changed, ... | null |
PYSEC-2021-262 | null | [
{
"commit_message": "[PATCH] Don't do any work when reshaping 0 elements sparse tensor. If reshaping to 0 elements tensor, check that input has no elements. If reshaping no elements input, check that output has no elements. PiperOrigin-RevId: 388296986 Change-Id: Iadc9fe7252e14313ca987e69bf0d7042fd10232a tensor... | null | |
CVE-2023-45136 | XWiki Platform web templates vulnerable to reflected XSS in the create document form if name validation is enabled | XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. When document names are validated according to a name strategy (disabled by default), XWiki starting in version 12.0-rc-1 and prior to versions 12.10.12 and 15.5-rc-1 is vulnerable to a reflected cross-site scripting attack in the page creation form. This allows an attacker to execute arbitrary actions with the rights of the user opening the malicious link. Depending on the rights of the user, this may allow remote code execution and full read and write access to the whole XWiki installation. This has been patched in XWiki 14.10.12 and 15.5-rc-1 by adding appropriate escaping. The vulnerable template file `createinline.vm` is part of XWiki's WAR and can be patched by manually applying the changes from the fix. | [
{
"commit_message": "[PATCH] XWIKI-20962: Escape template provider errors during document creation * Add escaping and a test .../main/resources/templates/createinline.vm | 6 ++- .../org/xwiki/web/CreateInlinePageTest.java | 48 +++++++++++++++++++ 2 files changed, 52 insertions(+), 2 deletions(-)",
"patc... | CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
CVE-2025-66302 | Grav vulnerable to Path Traversal allowing server files backup | Grav is a file-based Web platform. Prior to 1.8.0-beta.27, A path traversal vulnerability has been identified in Grav CMS, allowing authenticated attackers with administrative privileges to read arbitrary files on the underlying server filesystem. This vulnerability arises due to insufficient input sanitization in the backup tool, where user-supplied paths are not properly restricted, enabling access to files outside the intended webroot directory. The impact of this vulnerability depends on the privileges of the user account running the application. This vulnerability is fixed in 1.8.0-beta.27. | [
{
"commit_message": "[PATCH] Fix file read, DoS, and path traversal vulnerabilities Security fixes for: - GHSA-p4ww-mcp9-j6f2: Arbitrary file read via read_file() Twig function - GHSA-m8vh-v6r6-w7p6: DoS via malformed language code in regex - GHSA-j422-qmxp-hv94: Path traversal in backup root configuration Chan... | CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') |
CVE-2017-1000189 | nodejs ejs version older than 2.5.5 is vulnerable to a denial-of-service due to weak input validation in the ejs.renderFile() | [
{
"commit_message": "[PATCH] Blacklist a few other unsafe opts from passing in data obj lib/ejs.js | 14 +++++++++----- test/ejs.js | 18 ++++++++++++++++-- 2 files changed, 25 insertions(+), 7 deletions(-)",
"patch_text_b64": "RnJvbSA0OTI2NGUwMDM3ZTMxM2EwYTNlMDMzNDUwYjVjMTg0MTEyNTE2ZDhmIE1vbiBTZXAgMTcgMDA6M... | n/a | |
GHSA-2jcw-r79x-4r5v | Moodle does not set the RISK_XSS bit for graders | null | [
{
"commit_message": "[PATCH] MDL-48034 mod_lesson: grade capability missing RISK_XSS mod/lesson/db/access.php | 2 +- mod/lesson/version.php | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSBiOWM4NjgyM2M3MGExY2JhMjBiY2ExYzRiNWIwMzJlZTE1NTllMjJkIE1vbiBTZXAgMTcgMDA6MDA6MDAgM... | null |
CVE-2020-27560 | ImageMagick 7.0.10-34 allows Division by Zero in OptimizeLayerFrames in MagickCore/layer.c, which may cause a denial of service. | [
{
"commit_message": "[PATCH] There is a Division by Zero in function OptimizeLayerFrames (#2743) in file MagickCore/layer.c. cur->ticks_per_seconds can be zero with a crafted input argument *image. This is similar to CVE-2019-13454. MagickCore/layer.c | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-)",... | n/a | |
CVE-2014-0063 | Multiple stack-based buffer overflows in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via vectors related to an incorrect MAXDATELEN constant and datetime values involving (1) intervals, (2) timestamps, or (3) timezones, a different vulnerability than CVE-2014-0065. | [
{
"commit_message": "[PATCH] Fix handling of wide datetime input/output. MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Many server functions use the MAXDATELEN constant to size a buffer for parsing or displaying a datetime value. It was much too small for the longest... | n/a | |
GHSA-v82p-hv3v-p6qp | Incomplete validation in MKL requantization | null | [
{
"commit_message": "[PATCH] Reorganize and add more validation to MKL requantization PiperOrigin-RevId: 387901341 Change-Id: I2515b9034c64e113db0bcec8337d30643ab0a0f1 .../mkl/mkl_requantize_per_channel_op.cc | 40 ++++++++++++------- 1 file changed, 25 insertions(+), 15 deletions(-)",
"patch_text_b64":... | null |
GHSA-q73f-vjc2-3gqf | OpenStack Image Service (Glance) allows remote authenticated users to read arbitrary file | null | [
{
"commit_message": "[PATCH] Don't import files with backed files There's a security issue where it'd be possible to import images with backed files using the task engine and then use/convert those to access system files or any other file in the system. An example of an attack would be to import an image with a... | null |
PYSEC-2021-783 | null | [
{
"commit_message": "[PATCH] Add remaining validation to `sdca_internal.cc` PiperOrigin-RevId: 387738010 Change-Id: I28eedcfd87a53aaf34deb075acea1f8c95470808 tensorflow/core/kernels/sdca_internal.cc | 5 +++++ 1 file changed, 5 insertions(+)",
"patch_text_b64": "RnJvbSBhNGUxMzg2NjAyNzBlNzU5OTc5M2ZhNDM4Y2Q3Yj... | null | |
CVE-2025-65111 | SpiceDB's LookupResources with Multiple Entrypoints across Different Definitions Can Return Incomplete Results | SpiceDB is an open source database system for creating and managing security-critical application permissions. Prior to version 1.47.1, if a schema includes the following characteristics: permission defined in terms of a union (+) and that union references the same relation on both sides (but one side arrows to a different permission). Then SpiceDB may have missing LookupResources results when checking the permission. This only affects LookupResources; other APIs calculate permissionship correctly. The issue is fixed in version 1.47.1. | [
{
"commit_message": "[PATCH] Merge commit from fork * fix: fix entrypoints over relations that are reused for arrows Fixes the reachability graph to prevent skipping of necessary entrypoint computations when a relation is reused for an arrow in the same permission * fix: Fix building query planner trees that co... | CWE-277: Insecure Inherited Permissions |
CVE-2017-20187 | Magnesium-PHP Base.php formatEmailString injection | ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in Magnesium-PHP up to 0.3.0. It has been classified as problematic. Affected is the function formatEmailString of the file src/Magnesium/Message/Base.php. The manipulation of the argument email/name leads to injection. Upgrading to version 0.3.1 is able to address this issue. The patch is identified as 500d340e1f6421007413cc08a8383475221c2604. It is recommended to upgrade the affected component. VDB-244482 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | [
{
"commit_message": "[PATCH] Fix exploit of user's names/emails breaking \"To\" Before being added to the \"To\" string, emails and names are cleared of < > , and names are additionally cleared of @. See Magnesium\\Message\\Base::removeToStringBreakingSymbols() DocBlock for more details. src/Magnesium/Message/B... | CWE-74 Injection |
CVE-2013-7421 | The Crypto API in the Linux kernel before 3.18.5 allows local users to load arbitrary kernel modules via a bind system call for an AF_ALG socket with a module name in the salg_name field, a different vulnerability than CVE-2014-9644. | [
{
"commit_message": "[PATCH] crypto: prefix module autoloading with \"crypto-\" This prefixes all crypto module loading with \"crypto-\" so we never run the risk of exposing module auto-loading to userspace via a crypto API, as demonstrated by Mathias Krause: https://lkml.org/lkml/2013/3/4/70 Signed-off-by: Kee... | n/a | |
CVE-2017-16618 | An exploitable vulnerability exists in the YAML loading functionality of util.py in OwlMixin before 2.0.0a12. A "Load YAML" string or file (aka load_yaml or load_yamlf) can execute arbitrary Python commands resulting in command execution because load is used where safe_load should have been used. An attacker can insert Python into loaded YAML to trigger this vulnerability. | [
{
"commit_message": "[PATCH] :scream: Fix vulnerability of `load_yaml` and `load_yamlf` (#12) owlmixin/util.py | 7 +++---- tests/test_util.py | 38 +++++++++++++++++++++++++++++++++++ tests/yaml/vulnerability.yaml | 1 + 3 files changed, 42 insertions(+), 4 deletions(-) create mode 10064... | n/a | |
GHSA-3mw4-6rj6-74g5 | Null pointer dereference in TensorFlow | null | [
{
"commit_message": "[PATCH] Fix nullptr exception in QuantizedMaxPool op when empty list is sent to min_input or max_input parameters. PiperOrigin-RevId: 413960973 Change-Id: I9e3ded593f3c4eabf0d6d5dc356e6a19a3ad2682 tensorflow/core/kernels/quantized_pooling_ops.cc | 14 ++++++++++++++ 1 file changed, 14 insert... | null |
CVE-2024-32478 | Git Credential Manager (GCM)'s Debian package does not set root ownership on installed files | Git Credential Manager (GCM) is a secure Git credential helper. Prior to 2.5.0, the Debian package does not set root ownership on installed files. This allows user 1001 on a multi-user system can replace binary and gain other users' privileges. This vulnerability is fixed in 2.5.0.
| [
{
"commit_message": "[PATCH] linux: ensure Debian package files are owned by root Ensure that the files included in the Debian package are owned by the root user and not which ever user on the local system built the package. src/linux/Packaging.Linux/pack.sh | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)"... | CWE-732: Incorrect Permission Assignment for Critical Resource |
GHSA-pr5m-9548-wxhv | null | [
{
"commit_message": "[PATCH] drm/virtio: don't leak bo on drm_gem_object_init failure MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Reported-by: 李强 <liqiang6-s@360.cn> Signed-off-by: Gerd Hoffmann <kraxel@redhat.com> Link: http://patchwork.freedesktop.org/patch/msgid/... | null | |
CVE-2022-4066 | davidmoreno onion Log response.c onion_response_flush allocation of resources | A vulnerability was found in davidmoreno onion. It has been rated as problematic. Affected by this issue is the function onion_response_flush of the file src/onion/response.c of the component Log Handler. The manipulation leads to allocation of resources. The name of the patch is de8ea938342b36c28024fd8393ebc27b8442a161. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-214028. | [
{
"commit_message": "[PATCH 1/2] Fix a potential log spamming and DOS attack See PR for details src/onion/response.c | 29 ++++++++++++++++++++++++++--- 1 file changed, 26 insertions(+), 3 deletions(-)",
"patch_text_b64": "RnJvbSBkODAwOTI0OTZiNDZhMDE1NjNhMDI4Y2E0NTE0YzNmYzkzM2U4ODFlIE1vbiBTZXAgMTcgMDA6MDA6MD... | CWE-404 Denial of Service -> CWE-400 Resource Consumption -> CWE-770 Allocation of Resources |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.