id stringlengths 12 19 | title stringlengths 0 237 | description stringlengths 35 3.87k ⌀ | patches listlengths 1 22 | cwe stringlengths 2 440 ⌀ |
|---|---|---|---|---|
GHSA-8qch-vj6m-2694 | luigi Arbitrary File Write via Archive Extraction (Zip Slip) | null | [
{
"commit_message": "[PATCH] Fix arbitrary file write during tarfile extraction Fixes #3302 #3301 luigi/contrib/lsf_runner.py | 8 +-- luigi/contrib/sge_runner.py | 8 +-- luigi/safe_extractor.py | 97 ++++++++++++++++++++++++++++ test/safe_extractor_test.py | 125 ++++++++++++++++++++++++++++++++++++ 4 fi... | null |
GHSA-fm67-cv37-96ff | Potential double free of buffer during string decoding | null | [
{
"commit_message": "[PATCH] Fix double free on string decoding if realloc fails lib/ultrajsondec.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSBiMjFkYTQwZWFkNjQwYjYxNTM3ODNkYWQ1MDZlNjhiNDAyNDA1NmVmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBKdXN0QW5vdGhlckFyY2hpdmlzdCA8Sn... | null |
GHSA-c57p-3v2g-w9rg | Insertion of Sensitive Information into Log File in Apache Tomcat | null | [
{
"commit_message": "[PATCH] Fix CVE-2011-2204. Prevent user passwords appearing in log files if a runtime exception (e.g. OOME) occurs while creating a new user for a MemoryUserDatabase via JMX. git-svn-id: https://svn.apache.org/repos/asf/tomcat/trunk@1140070 13f79535-47bb-0310-9956-ffa450edef68 .../mbeans/Me... | null |
CVE-2017-5576 | Integer overflow in the vc4_get_bcl function in drivers/gpu/drm/vc4/vc4_gem.c in the VideoCore DRM driver in the Linux kernel before 4.9.7 allows local users to cause a denial of service or possibly have unspecified other impact via a crafted size value in a VC4_SUBMIT_CL ioctl call. | [
{
"commit_message": "[PATCH] drm/vc4: Fix an integer overflow in temporary allocation layout. We copy the unvalidated ioctl arguments from the user into kernel temporary memory to run the validation from, to avoid a race where the user updates the unvalidate contents in between validating them and copying them ... | n/a | |
CVE-2018-18074 | The Requests package before 2.20.0 for Python sends an HTTP Authorization header to an http URI upon receiving a same-hostname https-to-http redirect, which makes it easier for remote attackers to discover credentials by sniffing the network. | [
{
"commit_message": "[PATCH 1/2] Strip Authorization header whenever root URL changes Previously the header was stripped only if the hostname changed, but in an https -> http redirect that can leak the credentials on the wire (#4716). Based on with RFC 7235 section 2.2, the header is now stripped if the \"canon... | n/a | |
CVE-2020-9038 | Joplin through 1.0.184 allows Arbitrary File Read via XSS. | [
{
"commit_message": "[PATCH] All: Security: Fixed potential Arbitrary File Read via XSS .eslintignore | 1 + .gitignore | 1 + CliClient/package-lock.json | 14 ++ CliClient/package.json | 4 +- CliCli... | n/a | |
CVE-2025-7763 | thinkgem JeeSite Site Controller SiteController.java select redirect | A vulnerability, which was classified as problematic, was found in thinkgem JeeSite up to 5.12.0. Affected is the function select of the file src/main/java/com/jeesite/modules/cms/web/SiteController.java of the component Site Controller. The manipulation of the argument redirect leads to open redirect. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The patch is identified as 3d06b8d009d0267f0255acc87ea19d29d07cedc3. It is recommended to apply a patch to fix this issue. | [
{
"commit_message": "[PATCH] =?UTF-8?q?=E8=B0=83=E6=95=B4=E9=BB=98=E8=AE=A4=E7=9A=84?= =?UTF-8?q?=E5=85=81=E8=AE=B8=E9=87=8D=E5=AE=9A=E5=90=91=E5=9C=B0=E5=9D=80?= =?UTF-8?q?=EF=BC=8C=E5=8F=AA=E5=85=81=E8=AE=B8=E9=A1=B9=E7=9B=AE=E5=86=85?= =?UTF-8?q?=E9=83=A8=E8=B7=B3=E8=BD=AC?= MIME-Version: 1.0 Content-Type: t... | Open Redirect |
GHSA-q2jf-h9jm-m7p4 | Django contains Uncontrolled Resource Consumption via cached header | null | [
{
"commit_message": "[PATCH] [4.0.x] Fixed CVE-2023-23969 -- Prevented DoS with pathological values for Accept-Language. The parsed values of Accept-Language headers are cached in order to avoid repetitive parsing. This leads to a potential denial-of-service vector via excessive memory usage if the raw value of... | null |
GHSA-pwq6-w399-r46m | null | [
{
"commit_message": "[PATCH] System: Trust: Authorities - Sanitize $act parameter src/www/system_camanager.php | 1 + src/www/system_certmanager.php | 1 + 2 files changed, 2 insertions(+)",
"patch_text_b64": "RnJvbSBhNGY2YThmOGQ2MDQyNzFmODE5ODRjZmNiYmEwNDcxYWY1OGUzNGRjIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm... | null | |
CVE-2016-10124 | An issue was discovered in Linux Containers (LXC) before 2016-02-22. When executing a program via lxc-attach, the nonpriv session can escape to the parent session by using the TIOCSTI ioctl to push characters into the terminal's input buffer, allowing an attacker to escape the container. | [
{
"commit_message": "[PATCH] update lxc-attach manpage - explain rationale behind allocation of pty - briefly explain how a pty is allocated - add a short note that describes the changed behavior for lxc-attach when the user is not placed in a writeable cgroup at login Signed-off-by: Christian Brauner <christia... | n/a | |
CVE-2019-14669 | Firefly III 4.7.17.3 is vulnerable to stored XSS due to the lack of filtration of user-supplied data in the asset account name. The JavaScript code is executed during a visit to the audit account statistics page. | [
{
"commit_message": "[PATCH] Fix #2366 resources/views/v1/reports/audit/report.twig | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-)",
"patch_text_b64": "RnJvbSAyZGRmNDhmMTVjYmRiYjQ3NTIyMWMyOTk4NzI0MjBmNjI1YzNiYzNmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBKYW1lcyBDb2xlIDx0aGVncnVtcHlkaWN0YXRvckBn... | n/a | |
GHSA-46jm-3g2r-j53x | null | [
{
"commit_message": "[PATCH] Flush secureRandom buffer on fork Summary: On fork, flush the secureRandom buffer, so that we don't share entropy between the parent and child. Reviewed By: ricklavoie Differential Revision: D9196474 fbshipit-source-id: 12ff8488d814466186df61328a5f1d4000beb27f folly/Random.cpp ... | null | |
GHSA-qgj8-g9q4-7f2p | gotortc vulnerable to Cross-Site Request Forgery | null | [
{
"commit_message": "[PATCH] Add warning about secure access for API to docs README.md | 2 ++ 1 file changed, 2 insertions(+)",
"patch_text_b64": "RnJvbSA4NzkzYzM2MzY0OTNjNWVmZGRhMDhmM2I1ZWQ1YzZlMWVhNTk0ZmQ5IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBbGV4IFggPGFsZXhleS5raGl0QGdtYWlsLmNvbT4KRGF0ZTogVGh1LCAxM... | null |
CVE-2023-23620 | Discourse restricted tag routes leak topic information | Discourse is an open-source discussion platform. Prior to version 3.0.1 on the `stable` branch and 3.1.0.beta2 on the `beta` and `tests-passed` branches, the contents of latest/top routes for restricted tags can be accessed by unauthorized users. This issue is patched in version 3.0.1 on the `stable` branch and 3.1.0.beta2 on the `beta` and `tests-passed` branches. There are no known workarounds. | [
{
"commit_message": "[PATCH] SECURITY: only show restricted tag lists to authorized users (#20004) Co-authored-by: Penar Musaraj <pmusaraj@gmail.com> app/controllers/tags_controller.rb | 3 ++- spec/requests/tags_controller_spec.rb | 24 ++++++++++++++++++++++++ 2 files changed, 26 insertions(+), 1 deletion(-... | CWE-200 Information Exposure |
GHSA-8mp8-28xh-r486 | keyget vulnerable to prototype pollution | null | [
{
"commit_message": "[PATCH] [v,src,deps,spec,doc] v2.3.0 - Fix vulnerabilities. - Update outdated deps. - Increase coverage to 100%. .gitignore | 34 +- .npmignore | 4 - changelog.md | 15 +- index.js | 26 +- package.json | 23 +- pnpm-lock.yaml | 2231 ++... | null |
CVE-2022-3988 | Frappe Search navbar_search.html cross site scripting | A vulnerability was found in Frappe. It has been rated as problematic. Affected by this issue is some unknown functionality of the file frappe/templates/includes/navbar/navbar_search.html of the component Search. The manipulation of the argument q leads to cross site scripting. The attack may be launched remotely. The name of the patch is bfab7191543961c6cb77fe267063877c31b616ce. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-213560. | [
{
"commit_message": "[PATCH] fix(security): prevent xss attack in search (#18847) frappe/templates/includes/navbar/navbar_search.html | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSBiZmFiNzE5MTU0Mzk2MWM2Y2I3N2ZlMjY3MDYzODc3YzMxYjYxNmNlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpG... | CWE-707 Improper Neutralization -> CWE-74 Injection -> CWE-79 Cross Site Scripting |
CVE-2023-46740 | Insecure random string generator used for sensitive data | CubeFS is an open-source cloud-native file storage system. Prior to version 3.3.1, CubeFS used an insecure random string generator to generate user-specific, sensitive keys used to authenticate users in a CubeFS deployment. This could allow an attacker to predict and/or guess the generated string and impersonate a user thereby obtaining higher privileges. When CubeFS creates new users, it creates a piece of sensitive information for the user called the “accessKey”. To create the "accesKey", CubeFS uses an insecure string generator which makes it easy to guess and thereby impersonate the created user. An attacker could leverage the predictable random string generator and guess a users access key and impersonate the user to obtain higher privileges. The issue has been fixed in v3.3.1. There is no other mitigation than to upgrade. | [
{
"commit_message": "[PATCH] [Enhancement]: Optimize insecure random number generation in function util/string.go:RandomString close: #2696 Signed-off-by: true1064 <tangjingyu@oppo.com> proto/packet.go | 2 ++ sdk/data/stream/stream_writer.go | 3 ++- util/string.go | 10 +++++... | CWE-330: Use of Insufficiently Random Values |
GHSA-cj5w-8mjf-r5f8 | jupyterlab-git has a command injection vulnerability in "Open Git Repository in Terminal" | null | [
{
"commit_message": "[PATCH] Merge commit from fork See the advisory for more details. src/commandsAndMenu.tsx | 30 ++++++------------------------ 1 file changed, 6 insertions(+), 24 deletions(-)",
"patch_text_b64": "RnJvbSBiNDY0ODI5OTNmNzZkM2E1NDYwMTVjNmE5NGViZWQ4Yjc3ZmMyMzc2IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjA... | null |
GHSA-6fh2-w324-phpv | null | [
{
"commit_message": "[PATCH] Fix disclosure via filesystem buf.pl restores the scrollbuffer between \"/upgrade\"s by writing the contents to a file, and reading that after the new process was spawned. Through that file, the contents of (private) chat conversations may leak to other users. Careful users with a l... | null | |
CVE-2024-54141 | phpMyFAQ Generates an Error Message Containing Sensitive Information if database server is not available | phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. Prior to 4.0.0, phpMyFAQ exposes the database (ie postgreSQL) server's credential when connection to DB fails. This vulnerability is fixed in 4.0.0. | [
{
"commit_message": "[PATCH] fix: added SensitiveParameter attribute for database usernames and passwords phpmyfaq/src/phpMyFAQ/Database/Mysqli.php | 2 +- phpmyfaq/src/phpMyFAQ/Database/Pgsql.php | 20 ++++++++++++++------ phpmyfaq/src/phpMyFAQ/Database/Sqlite3.php | 2 +- phpmyfaq/src/phpMyFAQ/Database/Sqls... | CWE-209: Generation of Error Message Containing Sensitive Information |
CVE-2025-7759 | thinkgem JeeSite UEditor Image Grabber ActionEnter.java server-side request forgery | A vulnerability was identified in thinkgem JeeSite up to 5.12.0. This vulnerability affects unknown code of the file modules/core/src/main/java/com/jeesite/common/ueditor/ActionEnter.java of the component UEditor Image Grabber. Such manipulation of the argument Source leads to server-side request forgery. The attack may be performed from remote. The exploit is publicly available and might be used. The name of the patch is 1c5e49b0818037452148e0f8ff69ed04cb8fefdc. It is advisable to implement a patch to correct this issue. | [
{
"commit_message": "[PATCH] =?UTF-8?q?=E7=A6=81=E7=94=A8UEditor=E5=9B=BE=E7=89=87?= =?UTF-8?q?=E6=8A=93=E5=8F=96=E5=99=A8=EF=BC=8C=E5=AF=B9CMS=E6=A8=A1?= =?UTF-8?q?=E7=89=88=E6=9F=A5=E7=9C=8B=E7=9A=84=E5=9C=B0=E5=9D=80=E8=BF=9B?= =?UTF-8?q?=E8=A1=8C=E9=99=90=E5=AE=9A?= MIME-Version: 1.0 Content-Type: text/plai... | Server-Side Request Forgery |
GHSA-85cq-6gq9-363w | null | [
{
"commit_message": "[PATCH] Fix #48 forget remove token from ThreadLocal .../com/zrlog/web/util}/PluginHelper.java | 12 +- pom.xml | 104 ++++++++++++++++++ .../java/com/zrlog/service/UploadService.java | 3 +- .../com/zrlog/web/handler/PluginHandler.java | 14 ++- 4... | null | |
GHSA-j27g-r58q-624w | Craft CMS subject to URL forgery | null | [
{
"commit_message": "[PATCH] UsersService cleanup src/services/UsersService.php | 85 +++++++++++++++++------------------ 1 file changed, 42 insertions(+), 43 deletions(-)",
"patch_text_b64": "RnJvbSAzOGM1OTRiYWRjOGVmYzQ2OGI2MTYyZWM5MjFkNjQ1MDExYTUwZDM1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBicmFuZG9ua2Vs... | null |
GHSA-cqf2-6q6w-6cqw | null | [
{
"commit_message": "[PATCH] Fix kpasswd UDP ping-pong [CVE-2002-2443] The kpasswd service provided by kadmind was vulnerable to a UDP \"ping-pong\" attack [CVE-2002-2443]. Don't respond to packets unless they pass some basic validation, and don't respond to our own error packets. Some authors use CVE-1999-010... | null | |
GHSA-x5m3-795f-59g3 | null | [
{
"commit_message": "[PATCH] Fix #619 and #625 .../file_manager/FileManagerController.php | 62 +++++++++++++------ wolf/plugins/file_manager/i18n/en-message.php | 4 +- wolf/plugins/file_manager/views/index.php | 21 +++++-- wolf/plugins/file_manager/views/view.php | 14 ++++- 4 files changed, 72 inse... | null | |
CVE-2023-28112 | Discourse's SSRF protection missing for some FastImage requests | Discourse is an open-source discussion platform. Prior to version 3.1.0.beta3 of the `beta` and `tests-passed` branches, some user provided URLs were being passed to FastImage without SSRF protection. Insufficient protections could enable attackers to trigger outbound network connections from the Discourse server to private IP addresses. This affects any site running the `tests-passed` or `beta` branches versions 3.1.0.beta2 and prior. This issue is patched in version 3.1.0.beta3 of the `beta` and `tests-passed` branches. There are no known workarounds. | [
{
"commit_message": "[PATCH] SECURITY: Add FinalDestination::FastImage that's SSRF safe lib/cooked_processor_mixin.rb | 2 +- lib/final_destination/fast_image.rb | 23 ++++++ spec/lib/final_destination/fast_image_spec.rb | 70 +++++++++++++++++++ spec/services/search_indexer_spec.rb ... | CWE-918: Server-Side Request Forgery (SSRF) |
GHSA-wmmx-qvvm-hr27 | null | [
{
"commit_message": "[PATCH] Print potential XSS in error message handler app/controllers/system/ErrorController.php | 2 -- app/lib/ApplicationError.php | 4 ++-- app/lib/Controller/Request/RequestHTTP.php | 5 ++++- 3 files changed, 6 insertions(+), 5 deletions(-)",
"patch_text_b64": "RnJvbSA0O... | null | |
GHSA-7hmh-pfrp-vcx4 | Directus GraphQL Field Duplication Denial of Service (DoS) | null | [
{
"commit_message": "[PATCH] Merge pull request from GHSA-7hmh-pfrp-vcx4 * Add gql parser limit * Add changeset * Format docs Co-authored-by: Pascal Jufer <pascal-jufer@bluewin.ch> .changeset/flat-kids-jump.md | 6 ++++++ api/src/middleware/graphql.ts | 7 ++++++- docs/self-... | null |
GHSA-r6jv-7mgh-x66r | null | [
{
"commit_message": "[PATCH] Error out in rfbProcessFileTransferReadBuffer if length can not be allocated re #273 libvncserver/rfbserver.c | 14 ++++++++++++-- 1 file changed, 12 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSAxNWJiNzE5YzAzY2M3MGYxNGMzNmE4NDNkY2IxNmVkNjliNDA1NzA3IE1vbiBTZXAgMTcgMDA... | null | |
GHSA-6pcv-r3vc-xfcc | null | [
{
"commit_message": "[PATCH] rds: prevent dereference of a NULL device Binding might result in a NULL device, which is dereferenced causing this BUG: [ 1317.260548] BUG: unable to handle kernel NULL pointer dereference at 000000000000097 4 [ 1317.261847] IP: [<ffffffff84225f52>] rds_ib_laddr_check+0x82/0x110 [ ... | null | |
GHSA-rmqp-v4mv-mmxm | null | [
{
"commit_message": "[PATCH 1/2] avoid sql injection main.js | 74 ++++++++++++++++++++++++--------------------------------- 1 file changed, 31 insertions(+), 43 deletions(-)",
"patch_text_b64": "RnJvbSA1ZGMzZmI0OWUxY2M3ZmExMTQ3ZmI3NjU4YzFiYjEyZDE4MTQyNzZiIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBUaW5nIFpoY... | null | |
PYSEC-2021-566 | null | [
{
"commit_message": "[PATCH] Prevent division by 0 in `resource_variable_ops.cc` PiperOrigin-RevId: 387939939 Change-Id: Ib04902d63756633999959a70613f2eaa30c2c151 tensorflow/core/kernels/resource_variable_ops.cc | 11 +++++++++-- 1 file changed, 9 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSBhYz... | null | |
GHSA-jpfp-xq3p-4h3r | Deis Workflow Manager race condition vulnerability | null | [
{
"commit_message": "[PATCH] cluster_id is vulnerable to race condition when called concurrently (#94) * fix(cluster_id): Get() is \"insert if not exist\", needs read-write lock protection * fix(jobs): remove static clusterID getter in sendVersionsImpl 1) add generic data.ClusterID type in sendVersions type str... | null |
CVE-2016-6254 | Heap-based buffer overflow in the parse_packet function in network.c in collectd before 5.4.3 and 5.x before 5.5.2 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted network packet. | [
{
"commit_message": "[PATCH] network plugin: Fix heap overflow in parse_packet(). Emilien Gaspar has identified a heap overflow in parse_packet(), the function used by the network plugin to parse incoming network packets. This is a vulnerability in collectd, though the scope is not clear at this point. At the v... | n/a | |
GHSA-9pp5-9c7g-4r83 | Spring Security authorization bypass for method security annotations on private methods | null | [
{
"commit_message": "[PATCH] Use .equals to Compare Methods Closes gh-17143 .../authorization/method/aspectj/PreAuthorizeAspectTests.java | 4 ++-- .../core/annotation/UniqueSecurityAnnotationScanner.java | 4 ++-- 2 files changed, 4 insertions(+), 4 deletions(-)",
"patch_text_b64": "RnJvbSBiZjJhYWExYjE4... | null |
GHSA-xpfq-g4p2-qqqf | null | [
{
"commit_message": "[PATCH] Prevent video import on non unicast ips .../validators/videos/video-imports.ts | 18 ++++++++++++ .../tests/api/check-params/video-imports.ts | 28 +++++++++++++++++++ 2 files changed, 46 insertions(+)",
"patch_text_b64": "RnJvbSA3YjU0YTgxY2NjZjZiNGMxMjI2OWU5ZDY4OTdkNjA4Y... | null | |
GHSA-hj8r-465g-5vm4 | null | [
{
"commit_message": "[PATCH] Update update_setting.php Signed-off-by: Darius Jakaitis <105962203+flusity@users.noreply.github.com> core/tools/actions/update_setting.php | 47 +++++++++++++-------------- 1 file changed, 22 insertions(+), 25 deletions(-)",
"patch_text_b64": "RnJvbSBiOTlkZTNiZDA1Njc3ZThiNjFjMDR... | null | |
GHSA-92hx-3mh6-hc49 | kube-apiserver authentication bypass vulnerability | null | [
{
"commit_message": "[PATCH] pkg/securitycontextconstraints/sccadmission: simplify retrieving SCCs .../sccadmission/admission.go | 12 +++--------- 1 file changed, 3 insertions(+), 9 deletions(-)",
"patch_text_b64": "RnJvbSA4MDZmNTY4Nzk2Mjk1MWZlZmI0OTQyMDY0OTgzYmYxZWQwY2Q5NDM1IE1vbiBTZ... | null |
CVE-2016-9463 | Nextcloud Server before 9.0.54 and 10.0.1 & ownCloud Server before 9.1.2, 9.0.6, and 8.2.9 suffer from SMB User Authentication Bypass. Nextcloud/ownCloud include an optional and not by default enabled SMB authentication component that allows authenticating users against an SMB server. This backend is implemented in a way that tries to connect to a SMB server and if that succeeded consider the user logged-in. The backend did not properly take into account SMB servers that have any kind of anonymous auth configured. This is the default on SMB servers nowadays and allows an unauthenticated attacker to gain access to an account without valid credentials. Note: The SMB backend is disabled by default and requires manual configuration in the Nextcloud/ownCloud config file. If you have not configured the SMB backend then you're not affected by this vulnerability. | [
{
"commit_message": "[PATCH] Double verify the SMB response In case anonymous auth is allowed this can otherwise lead to unexpected actions. user_external/lib/smb.php | 43 +++++++++++++++++++++++++++++---------- 1 file changed, 32 insertions(+), 11 deletions(-)",
"patch_text_b64": "RnJvbSBiODVhY2U2ODQwYjhhN... | Incorrect Implementation of Authentication Algorithms (CWE-303) | |
GHSA-j2h6-73x8-22c4 | Exposure of Sensitive Information to an Unauthorized Actor in ansible | null | [
{
"commit_message": "[PATCH] [2.9] CVE-2020-1746 - Remove the params module option from ldap_attr and ldap_entry (#68714) * Remove the params module option from ldap_attr and ldap_entry Module options that circumvent Ansible's option handling were disallowed in: https://meetbot.fedoraproject.org/ansible-meeting... | null |
GHSA-hhw5-c326-822h | Open redirect in Apache Shiro | null | [
{
"commit_message": "[PATCH] The InvalidRequestFilter is more flexible Allowing encoded periods and forward slashes can now be independently enabled .../web/filter/InvalidRequestFilter.java | 56 ++++++++++++-- .../filter/InvalidRequestFilterTest.groovy | 75 ++++++++++++++++--- 2 files changed, 117 inser... | null |
CVE-2025-32380 | Apollo Router Query Validation Vulnerable to Excessive Resource Consumption via Named Fragment Processing | The Apollo Router Core is a configurable, high-performance graph router written in Rust to run a federated supergraph that uses Apollo Federation 2. A vulnerability in Apollo Router's usage of Apollo Compiler allowed queries with deeply nested and reused named fragments to be prohibitively expensive to validate. This could lead to excessive resource consumption and denial of service. Apollo Router's usage of Apollo Compiler has been updated so that validation logic processes each named fragment only once, preventing redundant traversal. This has been remediated in apollo-router versions 1.61.2 and 2.1.1. | [
{
"commit_message": "[PATCH] Certain query patterns may cause resource exhaustion MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Corrects a set of denial-of-service (DOS) vulnerabilities that made it possible for an attacker to render router inoperable with certain sim... | CWE-770: Allocation of Resources Without Limits or Throttling |
GHSA-hmf4-wxg4-957f | null | [
{
"commit_message": "[PATCH] Updates frontend to use RemoteRunnable, sanitize returned HTML (#239) .../app/api/chat/stream_log/route.ts | 17 +- .../app/components/ChatMessageBubble.tsx | 7 +- chat-langchain/app/components/ChatWindow.tsx | 144 ++++++++--------- chat-langchain/package.json ... | null | |
GHSA-4x2f-54wr-4hjg | Potential Zip Slip Vulnerability in baserCMS | null | [
{
"commit_message": "[PATCH] Merge pull request from GHSA-4x2f-54wr-4hjg MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit * 固定ページプレビュー実行時に入力内容検証を追加 * SimpleZipの利用を停止しZipArchiveの利用に切り替え * 不要コード除去 * BcZip利用時、ZipArchiveをopenしていない場合エラーログが出力される問題を改善",
"patch_text_b64": "R... | null |
GHSA-fvm8-v4j9-jgp3 | null | [
{
"commit_message": "[PATCH] Support all the new variables added src/npw-rpc.c | 7 +++++++ src/npw-viewer.c | 2 ++ src/utils.c | 7 +++++++ 3 files changed, 16 insertions(+)",
"patch_text_b64": "RnJvbSA3ZTRhYjhlMTE4OTg0NjA0MWY5NTVlNmM4M2Y3MmJjMTYyNGU3YTk4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBEYX... | null | |
GHSA-527m-2xhr-j27g | LLaMA Factory's Chat API Contains Critical SSRF and LFI Vulnerabilities | null | [
{
"commit_message": "[PATCH] Merge commit from fork * fix lfi and ssrf * move utils to common Co-authored-by: d3do <chamlinx@outlook.com> Co-authored-by: hiyouga <hiyouga@buaa.edu.cn> src/llamafactory/api/chat.py | 8 ++++- src/llamafactory/api/common.py | 62 ++++++++++++++++++++++++++++++++++ 2 files changed... | null |
PYSEC-2014-99 | null | [
{
"commit_message": "[PATCH] [http] fix traceback page xss ajenti/routing.py | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSBkM2ZjNWViMTQyZmYxNmQ1NWQxNThhZmIwNTBhZjE4ZDVmZjA5MTIwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBFdWdlbmUgUGFua292IDxqb2huLnBhbmtvdkBnbWFpbC5jb20+CkR... | null | |
CVE-2021-3799 | Improper Restriction of Rendered UI Layers or Frames in getgrav/grav-plugin-admin | grav-plugin-admin is vulnerable to Improper Restriction of Rendered UI Layers or Frames | [
{
"commit_message": "[PATCH] Fixed `X-Frame-Options` to be `DENY` in all admin pages to prevent a clickjacking attack CHANGELOG.md | 1 + classes/plugin/Router.php | 2 +- 2 files changed, 2 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSA4NTNhYmZiYmQzYzE0YTBhNjAxYzk0MWRjZmFhMzg1OGI2Mjgz... | CWE-1021 Improper Restriction of Rendered UI Layers or Frames |
GHSA-248v-346w-9cwc | Certifi removes GLOBALTRUST root certificate | null | [
{
"commit_message": "<41898282+github-actions[bot]@users.noreply.github.com> [PATCH] 2024.07.04 (#295) Co-authored-by: alex <772+alex@users.noreply.github.com> certifi/__init__.py | 2 +- certifi/cacert.pem | 40 ---------------------------------------- 2 files changed, 1 insertion(+), 41 deletions(-)",
"pa... | null |
GHSA-5fmg-x3vm-cm8v | null | [
{
"commit_message": "[PATCH] Fix open redirect starting with a slash and backslash src/mod_auth_openidc.c | 8 ++++++++ 1 file changed, 8 insertions(+)",
"patch_text_b64": "RnJvbSAyZDIwYzU4NTk3YzlmNzA2NWU1MzYyZTYwM2E1YzM0ODE0MWM0NWVhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBSU1PVE8gTk9SSUhJVE8gPGFpbW90b0Bv... | null | |
CVE-2025-30166 | Pimcore's Admin Classic Bundle allows HTML Injection | Pimcore's Admin Classic Bundle provides a Backend UI for Pimcore. An HTML injection issue allows users with access to the email sending functionality to inject arbitrary HTML code into emails sent via the admin interface, potentially leading to session cookie theft and the alteration of page content. The vulnerability was discovered in the /admin/email/send-test-email endpoint using the POST method. The vulnerable parameter is content, which permits the injection of arbitrary HTML code during the email sending process. While JavaScript code injection is blocked through filtering, HTML code injection remains possible. This vulnerability is fixed in 1.7.6. | [
{
"commit_message": "[PATCH] Fix: strip tags in text email (#877) src/Controller/Admin/EmailController.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSA3NmI2OTBkNGY4ZmNkOWM5ZDQxNzY2YmM1MjM4YzI1MTMyNDJlNjBlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiByb2JlcnRTdDcgPDEwNDc3MDc... | CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
CVE-2023-25819 | Discourse tags with no visibility are leaking into og:article:tag | Discourse is an open source platform for community discussion. Tags that are normally private are showing in metadata. This affects any site running the `tests-passed` or `beta` branches >= 3.1.0.beta2. The issue is patched in the latest `beta` and `tests-passed` version of Discourse. | [
{
"commit_message": "[PATCH] SECURITY: Show only visible tags in metadata Currently, the topic metadata show both public and private tags whereas only visible ones should be exposed. app/controllers/topics_controller.rb | 2 +- app/models/tag.rb | 1 + app/views/topics/show.html.erb ... | CWE-359: Exposure of Private Personal Information to an Unauthorized Actor |
CVE-2025-64343 | (conda) Constructor: Excessive permissions during and after installation | (conda) Constructor is a tool that enables users to create installers for conda package collections. In versions 3.12.2 and below, the installation directory inherits permissions from its parent directory. Outside of restricted directories, the permissions are very permissive and often allow write access by authenticated users. Any logged in user can make modifications during the installation for both single-user and all-user installations. This constitutes a local attack vector if the installation is in a directory local users have access to. For single-user installations in a shared directory, these permissions persist after the installation. This issue is fixed in version 3.13.0. | [
{
"commit_message": "[PATCH] Merge commit from fork * Detect icacls along with cmd.exe * Set permissions at the beginning of the installation process * Add comments explaining permission restrictions * Add news file * Add explanation for why users with deny directives are skipped * Abort if icacls command fails... | CWE-289: Authentication Bypass by Alternate Name |
CVE-2020-5235 | Out-of-memory condition in Nanopb is potentially exploitable | There is a potentially exploitable out of memory condition In Nanopb before 0.4.1, 0.3.9.5, and 0.2.9.4. When nanopb is compiled with PB_ENABLE_MALLOC, the message to be decoded contains a repeated string, bytes or message field and realloc() runs out of memory when expanding the array nanopb can end up calling `free()` on a pointer value that comes from uninitialized memory. Depending on platform this can result in a crash or further memory corruption, which may be exploitable in some cases. This problem is fixed in nanopb-0.4.1, nanopb-0.3.9.5, nanopb-0.2.9.4. | [
{
"commit_message": "[PATCH] Fix invalid free() after failed realloc() (GHSA-gcx3-7m76-287p) pb_decode.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-)",
"patch_text_b64": "RnJvbSA0NTU4MmYxZjk3ZjQ5ZTJhYmZkYmExNDYzZDFlMTAyNzY4MmQ5ODU2IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBQZXR0ZXJpIEFpbW9uZW4... | CWE-125: Out-of-bounds Read |
GHSA-963h-3v39-3pqf | Vega vulnerable to Cross-site Scripting via RegExp.prototype[@@replace] | null | [
{
"commit_message": "[PATCH] Merge commit from fork packages/vega-functions/src/functions/sequence.js | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSA2OTQ1NjBjMGFhNTc2ZGY4YjZjNWYwZjdkMjAyYWM4MjIzM2U2OTY2IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBDYW1lcm9uIFlpY2sgPGh5ZHJvc... | null |
GHSA-v67x-gpg7-mwv3 | Exposure of Sensitive Information in Jenkins Kubernetes Plugin | null | [
{
"commit_message": "[PATCH] [SECURITY-883] CHANGELOG.md | 4 +++ pom.xml | 11 ++++++ .../pipeline/ContainerExecDecorator.java | 31 +++++++++------- .../ContainerExecDecoratorPipelineTest.java | 35 +++++++++++++++++++ .../plugins/kube... | null |
CVE-2017-12858 | Double free vulnerability in the _zip_dirent_read function in zip_dirent.c in libzip allows attackers to have unspecified impact via unknown vectors. | [
{
"commit_message": "[PATCH] Fix double free(). Found by Brian 'geeknik' Carpenter using AFL. THANKS | 1 + lib/zip_dirent.c | 3 --- 2 files changed, 1 insertion(+), 3 deletions(-)",
"patch_text_b64": "RnJvbSAyMjE3MDIyYjdkMTE0MjczODY1NmQ4OTFlMDBiM2QyZDkxNzliNzk2IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGc... | n/a | |
GHSA-fmj5-4m95-44jw | null | [
{
"commit_message": "[PATCH] Detect bad e_shstrtab better. https://github.com/upx/upx/issues/332 modified: p_lx_elf.cpp src/p_lx_elf.cpp | 10 ++++++---- 1 file changed, 6 insertions(+), 4 deletions(-)",
"patch_text_b64": "RnJvbSAxYmI5M2Q0ZmNlOWYxZDc2NGJhNTdiZjVhYzE1NGFmNTE1YjNmYzgzIE1vbiBTZXAgMTcgMDA6MDA6... | null | |
CVE-2021-43784 | Overflow in netlink bytemsg length field allows attacker to override netlink-based container configuration | runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc, netlink is used internally as a serialization system for specifying the relevant container configuration to the `C` portion of the code (responsible for the based namespace setup of containers). In all versions of runc prior to 1.0.3, the encoder did not handle the possibility of an integer overflow in the 16-bit length field for the byte array attribute type, meaning that a large enough malicious byte array attribute could result in the length overflowing and the attribute contents being parsed as netlink messages for container configuration. This vulnerability requires the attacker to have some control over the configuration of the container and would allow the attacker to bypass the namespace restrictions of the container by simply adding their own netlink payload which disables all namespaces. The main users impacted are those who allow untrusted images with untrusted configurations to run on their machines (such as with shared cloud infrastructure). runc version 1.0.3 contains a fix for this bug. As a workaround, one may try disallowing untrusted namespace paths from your container. It should be noted that untrusted namespace paths would allow the attacker to disable namespace protections entirely even in the absence of this bug. | [
{
"commit_message": "[PATCH] Open bind mount sources from the host userns The source of the bind mount might not be accessible in a different user namespace because a component of the source path might not be traversed under the users and groups mapped inside the user namespace. This caused errors such as the f... | CWE-190: Integer Overflow or Wraparound |
GHSA-rg8f-5p7x-m6wv | MantisBT CSV Injection unprivileged user access in csv_export.php | null | [
{
"commit_message": "[PATCH] Escape strings to prevent CSV injection Prefixing the string with a tab when it starts with =, -, + or @. Thanks to Devendra Bhatla for reporting the issue. Fixes #29130, CVE-2021-43257 core/csv_api.php | 7 +++++++ 1 file changed, 7 insertions(+)",
"patch_text_b64": "RnJvbSA3ZjQ... | null |
GHSA-327c-qx3v-h673 | Always-Incorrect Control Flow Implementation in Facebook Hermes | null | [
{
"commit_message": "[PATCH] Fix CVE-2020-1914 by using NEXTINST for SaveGeneratorLong Summary: If `SaveGeneratorLong` was emitted, it would accidentally jump to the wrong next instruction, based on how long SaveGenerator was. Make a callout function to handle the common case, and handle the dispatch within eac... | null |
GHSA-rrjm-x5m6-q2pg | null | [
{
"commit_message": "[PATCH] HTTP API: Protect against hex interpretation. Return earlier from wp_http_validate_url(). Props: iandunn, xknown, voldemortensen, whyisjake. Built from https://develop.svn.wordpress.org/trunk@46475 git-svn-id: http://core.svn.wordpress.org/trunk@46273 1a063a9b-81f0-0310-95a4-ce76da2... | null | |
CVE-2012-4520 | The django.http.HttpRequest.get_host function in Django 1.3.x before 1.3.4 and 1.4.x before 1.4.2 allows remote attackers to generate and display arbitrary URLs via crafted username and password Host header values. | [
{
"commit_message": "[PATCH] Fixed a security issue related to password resets Full disclosure and new release are forthcoming backport from master django/contrib/auth/tests/urls.py | 1 + django/contrib/auth/tests/views.py | 39 ++++++++++++++++++++++++++++++ django/contrib/auth/views.py | 2 +- django/h... | n/a | |
GHSA-jv36-3qpq-7g23 | null | [
{
"commit_message": "[PATCH] Lossless decomp: Range-limit 12-bit samples 12-bit is the only data precision for which the range of the sample data type exceeds the valid sample range, so it is possible to craft a 12-bit lossless JPEG image that contains out-of-range 12-bit samples. Attempting to decompress such ... | null | |
CVE-2022-4902 | eXo Chat Application Mention ExoChatMessageComposer.vue cross site scripting | A vulnerability classified as problematic has been found in eXo Chat Application. Affected is an unknown function of the file application/src/main/webapp/vue-app/components/ExoChatMessageComposer.vue of the component Mention Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 3.3.0-20220417 is able to address this issue. The name of the patch is 26bf307d3658d1403cfd5c3ad423ce4c4d1cb2dc. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-220212. | [
{
"commit_message": "<romain.denarie@exoplatform.com> [PATCH] Task-56304 : XSS issue in chat Before this fix, when sending a message with a mention, there is an XSS issue This commit encode html entities in the message before adding markup related to the mention so that, the malicious html is not evaluated .../... | CWE-79 Cross Site Scripting |
GHSA-fqpx-xfjr-2qr9 | CSRF vulnerability and missing permission checks in Jenkins Extended Choice Parameter Plugin allow SSRF | null | [
{
"commit_message": "[PATCH] CVE-2022-27204 Implement suggestion from https://www.jenkins.io/doc/developer/security/form-validation/ .../ExtendedChoiceParameterDefinition.java | 5 +++++ 1 file changed, 5 insertions(+)",
"patch_text_b64": "RnJvbSBlZmY5NDcyYjY0ZjY4NzQ5ZTUyNzJhYTU5YjY4ZTU2MWZ... | null |
GHSA-jq7p-26h5-w78r | Out-of-bounds read in Apache Thrift | null | [
{
"commit_message": "[PATCH] additional test for TSimpleJSONProtocol lib/go/thrift/json_protocol.go | 5 +---- lib/go/thrift/simple_json_protocol.go | 4 ++-- lib/go/thrift/simple_json_protocol_test.go | 22 ++++++++++++++++++++++ 3 files changed, 25 insertions(+), 6 deletions(-)",
"patch_te... | null |
CVE-2023-26141 | Versions of the package sidekiq before 7.1.3 are vulnerable to Denial of Service (DoS) due to insufficient checks in the dashboard-charts.js file. An attacker can exploit this vulnerability by manipulating the localStorage value which will cause excessive polling requests. | [
{
"commit_message": "[PATCH] Validate page refresh interval to ensure a minimum amount of delay web/assets/javascripts/application.js | 1 + web/assets/javascripts/dashboard-charts.js | 4 +++- 2 files changed, 4 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSA2MmM5MGQ3YzVhN2Q4YTM3OGQ3OTkwOTg1OW... | Denial of Service (DoS) | |
CVE-2014-3710 | The donote function in readelf.c in file through 5.20, as used in the Fileinfo component in PHP 5.4.34, does not ensure that sufficient note headers are present, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted ELF file. | [
{
"commit_message": "[PATCH] Fix note bounds reading, Francisco Alonso / Red Hat ChangeLog | 4 ++++ src/readelf.c | 9 ++++++++- 2 files changed, 12 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSAzOWM3YWMxMTA2YmU4NDRhNTI5NmQzZWI1OTcxOTQ2Y2MwOWZmZGEwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBDaH... | n/a | |
CVE-2011-4913 | The rose_parse_ccitt function in net/rose/rose_subr.c in the Linux kernel before 2.6.39 does not validate the FAC_CCITT_DEST_NSAP and FAC_CCITT_SRC_NSAP fields, which allows remote attackers to (1) cause a denial of service (integer underflow, heap memory corruption, and panic) via a small length value in data sent to a ROSE socket, or (2) conduct stack-based buffer overflow attacks via a large length value in data sent to a ROSE socket. | [
{
"commit_message": "[PATCH] ROSE: prevent heap corruption with bad facilities When parsing the FAC_NATIONAL_DIGIS facilities field, it's possible for a remote host to provide more digipeaters than expected, resulting in heap corruption. Check against ROSE_MAX_DIGIS to prevent overflows, and abort facilities p... | n/a | |
GHSA-f4mm-2r69-mg5f | OpenFGA Authorization Bypass | null | [
{
"commit_message": "[PATCH] Merge pull request from GHSA-f4mm-2r69-mg5f pkg/typesystem/typesystem.go | 53 +++++++-- server/test/write_authzmodel.go | 197 +++++++++++++++++++++++++++++--- 2 files changed, 225 insertions(+), 25 deletions(-)",
"patch_text_b64": "RnJvbSBjOGRiMWVlM2QyYTM2NmYxOGU1ODVkZDMzMjM... | null |
GHSA-qrmm-w75w-3wpx | Server side request forgery in SwaggerUI | null | [
{
"commit_message": "[PATCH] Bump swagger-ui-dist in /src/Swashbuckle.AspNetCore.SwaggerUI Bumps [swagger-ui-dist](https://github.com/swagger-api/swagger-ui) from 3.52.1 to 4.1.3. - [Release notes](https://github.com/swagger-api/swagger-ui/releases) - [Commits](https://github.com/swagger-api/swagger-ui/compare/... | null |
GHSA-874r-46c6-7p4r | Stored Cross-site Scripting vulnerability in Jenkins Favorite Plugin | null | [
{
"commit_message": "[PATCH] [SECURITY-2557] .../favorite/column/FavoriteColumn/column.jelly | 17 +++++++++++++++-- .../user/FavoriteUserProperty/config.jelly | 17 +++++++++++++++-- 2 files changed, 30 insertions(+), 4 deletions(-)",
"patch_text_b64": "RnJvbSA1NDNhNGQ4N2M0ZmFkZTAyMTczZjc5MzkwNWE5OWFkZW... | null |
CVE-2015-10098 | Broken Link Checker Plugin ui_get_action_links cross site scripting | A vulnerability was found in Broken Link Checker Plugin up to 1.10.5 on WordPress. It has been rated as problematic. Affected by this issue is the function print_module_list/show_warnings_section_notice/status_text/ui_get_action_links. The manipulation leads to cross site scripting. The attack may be launched remotely. Upgrading to version 1.10.6 is able to address this issue. The name of the patch is f30638869e281461b87548e40b517738b4350e47. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-225152. | [
{
"commit_message": "[PATCH] Fix a CSRF/XSS vulnerability caused by not escaping the URL returned by add_query_arg(). Version 1.10.6 (stable). git-svn-id: https://plugins.svn.wordpress.org/broken-link-checker/trunk@1139206 b8457f37-d9ea-0310-8a92-e5e31aec5664 core/core.php | 8 ++++---- includes/any-post... | CWE-79 Cross Site Scripting |
CVE-2024-10553 | Jdbc Deserialization in h2oai/h2o-3 | A vulnerability in the h2oai/h2o-3 REST API versions 3.46.0.4 allows unauthenticated remote attackers to execute arbitrary code via deserialization of untrusted data. The vulnerability exists in the endpoints POST /99/ImportSQLTable and POST /3/SaveToHiveTable, where user-controlled JDBC URLs are passed to DriverManager.getConnection, leading to deserialization if a MySQL or PostgreSQL driver is available in the classpath. This issue is fixed in version 3.47.0. | [
{
"commit_message": "[PATCH] GH-16425 Add JDBC parameter validation [nocheck] (#16432) * GH-16425 Add JDBC parameter validation * swap exception expectation .../src/main/java/water/jdbc/SQLManager.java | 45 +++++++++++++++++++ .../test/java/water/jdbc/SQLManagerTest.java | 20 +++++++++ 2 files changed, 65 ins... | CWE-502 Deserialization of Untrusted Data |
CVE-2022-2345 | Use After Free in vim/vim | Use After Free in GitHub repository vim/vim prior to 9.0.0046. | [
{
"commit_message": "[PATCH] patch 9.0.0047: using freed memory with recursive substitute Problem: Using freed memory with recursive substitute. Solution: Always make a copy for reg_prev_sub. src/ex_cmds.c | 11 ++++++++++- src/regexp.c | 8 ++++---- src/testdir/test... | CWE-416 Use After Free |
GHSA-pqvg-9fh5-x297 | null | [
{
"commit_message": "[PATCH] xss fixes .../views/advanced_settings/adminUsers.php | 8 +++--- .../views/advanced_settings/languages.php | 2 +- .../modules/admin/views/blog/blogpublish.php | 2 +- .../admin/views/ecommerce/discounts.php | 20 ++++++------- .../modules/admin/views/ecommerce/publish.... | null | |
GHSA-6chw-6frg-f759 | Regular Expression Denial of Service in Acorn | null | [
{
"commit_message": "[PATCH] More rigorously check surrogate pairs in regexp validator acorn/src/regexp.js | 8 +++++--- test/tests-regexp.js | 1 + 2 files changed, 6 insertions(+), 3 deletions(-)",
"patch_text_b64": "RnJvbSA3OTNjMGU1NjllZDExNTg2NzJlM2E0MGFlZWQxZDg1MTg4MzJiODAyIE1vbiBTZXAgMTcgMDA6MDA6MDAgMj... | null |
GHSA-w48j-pp7j-fj55 | Valtimo scripting engine can be used to gain access to sensitive data or resources | null | [
{
"commit_message": "[PATCH] Process engine js sandboxing .../CamundaContextConfiguration.java | 13 +++- .../AllowedClassesScriptEngineResolver.kt | 65 +++++++++++++++++++ .../valtimo/ScriptingWhitelistPlugin.kt | 39 +++++++++++ .../JavascriptScriptTaskProcessIntTest.kt | 44 +++++++++++++... | null |
CVE-2023-0610 | Improper Authorization in wallabag/wallabag | Improper Authorization in GitHub repository wallabag/wallabag prior to 2.5.3. | [
{
"commit_message": "[PATCH] AnnotationController: fix improper authorization vulnerability This PR is based on 2.5.x branch. We fix the improper authorization by retrieving the annotation using id and user id. We also replace the ParamConverter used to get the requested Annotation on put and delete actions wit... | CWE-285 Improper Authorization |
GHSA-7x94-6g2m-3hp2 | Defining resource name as integer may give unintended access in vantage6 | null | [
{
"commit_message": "[PATCH 01/19] Improved POST request validation by using marshmallow for endpoints related to collaboration, task, node, organization, account recovery and VPN .../vantage6/server/resource/collaboration.py | 37 +++- .../server/resource/common/_schema.py | 23 +-- .../server/resource... | null |
GHSA-r4pf-3v7r-hh55 | electron-builder's NSIS installer - execute arbitrary code on the target machine (Windows only) | null | [
{
"commit_message": "[PATCH] fix: execute `%SYSTEMROOT%` cmd.exe directly during NSIS installer (#8059) .changeset/large-trainers-enjoy.md | 5 +++++ .../nsis/include/allowOnlyOneInstallerInstance.nsh | 6 +++--- 2 files changed, 8 insertions(+), 3 deletions(-) create mode 100644... | null |
GHSA-wjg8-pxqj-c3c7 | Artesãos SEOTools Open Redirect vulnerability | null | [
{
"commit_message": "[PATCH] open redirect vulnerability fixes (#201) * open redirect vulnerability fix for opengraph * open redirect vulnerability fix for twitter cards * open redirect vulnerability fix for setTitle * fixed preg replace * Update OpenGraph.php * Update TwitterCards.php src/SEOTools/OpenGraph.ph... | null |
GHSA-q2x3-2f9g-h559 | Moodle's Mustache pix helper contained a potential Mustache injection risk if combined with user input | null | [
{
"commit_message": "[PATCH] MDL-75659 core: Don't render component argument twice in mustache pix helper lib/classes/output/mustache_pix_helper.php | 1 - 1 file changed, 1 deletion(-)",
"patch_text_b64": "RnJvbSAxMjhjMGMyMTYwN2E3MWY0MTE2MTFhMDEwNGIyYThjODU4ZGQ2ZmNhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOi... | null |
GHSA-3872-f48p-pxqj | Improper Neutralization of Special Elements used in a Command ('Command Injection') in Weblate | null | [
{
"commit_message": "[PATCH] vcs: Improve mercurial parameters handling Make sure that all user provided input is handled as expected. weblate/vcs/mercurial.py | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-)",
"patch_text_b64": "RnJvbSAzNWQ1OWYxZjA0MDU0MWMzNThjZWNlMGE4ZDRhNjMxODNjYTkxOWI4IE1vbi... | null |
CVE-2017-9204 | The iw_get_ui16le function in imagew-util.c:405:23 in libimageworsener.a in ImageWorsener 1.3.1 allows remote attackers to cause a denial of service (invalid read and SEGV) via a crafted image, related to imagew-jpeg.c. | [
{
"commit_message": "[PATCH] Fixed invalid memory access bugs when decoding JPEG Exif data Fixes issues #22, #23, #24, #25 src/imagew-jpeg.c | 38 +++++++++++++++++++++++++------------- 1 file changed, 25 insertions(+), 13 deletions(-)",
"patch_text_b64": "RnJvbSBiNDVjYjFiNjY1YTE0YjAxNzViOWNiMTUwMmVmNzE2OGUx... | n/a | |
CVE-2022-36004 | `CHECK` fail in `tf.random.gamma` in TensorFlow | TensorFlow is an open source platform for machine learning. When `tf.random.gamma` receives large input shape and rates, it gives a `CHECK` fail that can trigger a denial of service attack. We have patched the issue in GitHub commit 552bfced6ce4809db5f3ca305f60ff80dd40c5a3. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue. | [
{
"commit_message": "[PATCH] Fix size check for large input shape and rates. To address a check failure for exceedingly large output shapes, we need to `AppendShapeWithStatus`. PiperOrigin-RevId: 462885894 tensorflow/core/kernels/random_op.cc | 2 +- tensorflow/core/kernels/random_poisson_op.cc ... | CWE-617: Reachable Assertion |
PYSEC-2021-673 | null | [
{
"commit_message": "[PATCH] Add missing validation in `QuantizedBatchNormWithGlobalNormalization` PiperOrigin-RevId: 370123451 Change-Id: Id234d6dab1ec21230bb8e503dba30f899af87f33 .../core/kernels/quantized_batch_norm_op.cc | 77 ++++++++++++++++--- 1 file changed, 67 insertions(+), 10 deletions(-)",
"pat... | null | |
GHSA-pr3h-jjhj-573x | Sprockets path traversal leads to information leak | null | [
{
"commit_message": "[PATCH] Do not respond to http requests asking for a `file://` Based on CVE-2018-3760 when the Sprockets server is accidentally being used in production, an attacker can pass in a specifically crafted url that will allow them access to view every file on the system. If the file hit contains... | null |
GHSA-pfrc-5hhq-6hvr | Showdoc Unauthenticated Access | null | [
{
"commit_message": "[PATCH] Update CatalogController.class.php .../Application/Api/Controller/CatalogController.class.php | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSBiY2RiNWUzNTE5Mjg1YmRmODFlNjE4YjNjOWI5MGQyMmJjNDllMTNjIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBzd... | null |
CVE-2022-23638 | Cross-site Scripting in svg-sanitizer | svg-sanitizer is a SVG/XML sanitizer written in PHP. A cross-site scripting vulnerability impacts all users of the `svg-sanitizer` library prior to version 0.15.0. This issue is fixed in version 0.15.0. There is currently no workaround available. | [
{
"commit_message": "[PATCH 1/5] Remove malformed elements src/Sanitizer.php | 102 ++++++++++++++++++++++++++++++++++------------ 1 file changed, 77 insertions(+), 25 deletions(-)",
"patch_text_b64": "RnJvbSAwM2U4OGE4YWFmZDY5ZWI4M2ZhYTMzYzlhMzhkYTQ4MmFjOTE4N2QxIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBEYXJ... | CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
GHSA-fj93-7wm4-8x2g | Cross-Site Scripting in jquery-mobile | null | [
{
"commit_message": "[PATCH] Check Content-Type header before parsing AJAX response as HTML (#8649) Fix for issue #8640 (possible XSS vulnerability) js/widgets/pagecontainer.js | 9 +++++++++ 1 file changed, 9 insertions(+)",
"patch_text_b64": "RnJvbSBiMGQ5Y2M3NThhNDhmMTMzMjE3NTBkNzQwOWZiNzY1NWRjZGYyYjUwIE1v... | null |
CVE-2017-12595 | The tokenizer in QPDF 6.0.0 and 7.0.b1 is recursive for arrays and dictionaries, which allows remote attackers to cause a denial of service (stack consumption and segmentation fault) or possibly have unspecified other impact via a PDF document with a deep data structure, as demonstrated by a crash in QPDFObjectHandle::parseInternal in libqpdf/QPDFObjectHandle.cc. | [
{
"commit_message": "[PATCH] Parse iteratively to avoid stack overflow (fixes #146) ChangeLog | 3 + include/qpdf/QPDFObjectHandle.hh | 1 - libqpdf/QPDFObjectHandle.cc | 248 ++++++++++++++++++------------- qpdf/qtest/qpdf.test | 1 + qpdf/qtest/qpdf/issue-146.out |... | n/a | |
PYSEC-2024-119 | null | [
{
"commit_message": "[PATCH] bugfix: Raise error if multipart boundry is invalid. modules/overwrites.py | 406 +++++++++++++++++++++++++++++++++++++++++- 1 file changed, 404 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSA5MTkyMjJkMjg1ZDczYjlkY2Q3MWZiMzRkZTM3OWVlZjhjOTBkMTc1IE1vbiBTZXAgMTcgMDA6MDA6... | null | |
GHSA-vgxq-xv7f-jxjx | ChakraCore RCE Vulnerability | null | [
{
"commit_message": "[PATCH] [CVE-2018-8290] OOB profile read/write - Google, Inc lib/Runtime/Language/InterpreterHandler.inl | 4 +- .../Language/InterpreterStackFrame.cpp | 50 +++++++++++-------- lib/Runtime/Language/InterpreterStackFrame.h | 24 +++++---- 3 files changed, 46 insertions(+), 32 deleti... | null |
GHSA-pxcf-v868-m492 | Injection and Cross-site Scripting in osm-static-maps | null | [
{
"commit_message": "[PATCH] fix: escape special characters before insertion to template src/server.js | 31 +++++++++++++++++++++++++------ 1 file changed, 25 insertions(+), 6 deletions(-)",
"patch_text_b64": "RnJvbSA5NzM1NWQyOWUwODc1M2QxY2ZlOTliMTI4MWRiYWEwNmY0ZTY1MWIwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm... | null |
CVE-2021-32691 | Auto-merging Person Records Compromised | Apollos Apps is an open source platform for launching church-related apps. In Apollos Apps versions prior to 2.20.0, new user registrations are able to access anyone's account by only knowing their basic profile information (name, birthday, gender, etc). This includes all app functionality within the app, as well as any authenticated links to Rock-based webpages (such as giving and events). There is a patch in version 2.20.0. As a workaround, one can patch one's server by overriding the `create` data source method on the `People` class. | [
{
"commit_message": "[PATCH] fix: turns off automerging new people (#1989) * fix: turns off automerging new people * fix * tests and snaps .../src/auth/__tests__/index.tests.js | 4 +++- .../__tests__/__snapshots__/data-source.tests.js.snap | 8 +------- .../src/people/data-source.js ... | CWE-303: Incorrect Implementation of Authentication Algorithm |
CVE-2014-125057 | mrobit robitailletheknot CSRF Token filters.php comparison | A vulnerability was found in mrobit robitailletheknot. It has been classified as problematic. This affects an unknown part of the file app/filters.php of the component CSRF Token Handler. The manipulation of the argument _token leads to incorrect comparison. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The patch is named 6b2813696ccb88d0576dfb305122ee880eb36197. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217599. | [
{
"commit_message": "[PATCH] Patch security vulnerability. app/filters.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSA2YjI4MTM2OTZjY2I4OGQwNTc2ZGZiMzA1MTIyZWU4ODBlYjM2MTk3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBNYXR0aGV3IFJvYml0YWlsbGUgPG1hdHRoZXdAcm9iaXRhaWxsZS5pbz4... | CWE-697 Incorrect Comparison |
GHSA-hr9r-8phq-5x8j | OpenFGA vulnerable to denial of service due to circular relationship | null | [
{
"commit_message": "[PATCH] Merge pull request from GHSA-hr9r-8phq-5x8j * fix: validate models with no entrypoints correctly * chore: fix map clone on union case * fix: clone visited map for base and subtract set in exclusion * fix: tidy up godoc and resolve issues with tests * test: drop duplicate test cases ... | null |
GHSA-vgg5-g88f-mq8p | null | [
{
"commit_message": "[PATCH] bug fixes (#4280) interface/orders/patient_match_dialog.php | 2 +- interface/patient_file/report/patient_report.php | 2 +- interface/usergroup/mfa_registrations.php | 4 ++-- interface/usergroup/mfa_totp.php | 4 ++-- interface/usergroup/mfa_u2f.php ... | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.