id stringlengths 12 19 | title stringlengths 0 237 | description stringlengths 35 3.87k ⌀ | patches listlengths 1 22 | cwe stringlengths 2 440 ⌀ |
|---|---|---|---|---|
GHSA-9gxf-8qj8-9g4f | null | [
{
"commit_message": "[PATCH] defrag - take protocol into account during re-assembly The IP protocol was not being used to match fragments with their packets allowing a carefully constructed packet with a different protocol to be matched, allowing re-assembly to complete, creating a packet that would not be re-a... | null | |
GHSA-vq7j-qx4g-8wh5 | null | [
{
"commit_message": "[PATCH] Security update: correct misuse of `add_query_arg()` as identified by Sucuri: https://blog.sucuri.net/2015/04/security-advisory-xss-vulnerability-affecting-multiple-wordpress-plugins.html. Also bumps WP compatability git-svn-id: https://plugins.svn.wordpress.org/view-all-posts-pages... | null | |
GHSA-33vf-4xgg-9r58 | HTTP Response Splitting (Early Hints) in Puma | null | [
{
"commit_message": "[PATCH] HTTP Injection - fix bug + 1 more vector (#2136) + Fixes a problem in 4.3.2/3.12.3 where we were not splitting newlines in headers according to Rack spec + Fixes another vector for HTTP injection - early hints History.md | 7 +++++ lib/puma/const.rb | 2 +- lib/... | null |
CVE-2025-62174 | Mastodon allows continued access after password reset via CLI | Mastodon is a free, open-source social network server based on ActivityPub. In Mastodon before 4.4.6, 4.3.14, and 4.2.27, when an administrator resets a user account's password via the command-line interface using `bin/tootctl accounts modify --reset-password`, active sessions and access tokens for that account are not revoked. This allows an attacker with access to a previously compromised session or token to continue using the account after the password has been reset. This issue has been patched in versions 4.2.27, 4.3.14, and 4.4.6. No known workarounds exist. | [
{
"commit_message": "[PATCH] Merge commit from fork * Ensure tootctl revokes sessions, access tokens and web push subscriptions * Fix test coverage Co-authored-by: Emelia Smith <ThisIsMissEm@users.noreply.github.com> app/models/user.rb | 13 +++++++++---- lib/mastodon/cli/accounts.rb ... | CWE-613: Insufficient Session Expiration |
GHSA-378x-6p4f-8jgm | SKOPS Card.get_model happily allows arbitrary code execution | null | [
{
"commit_message": "[PATCH] ENH harden Card by adding a flag to allow/disallow insecure pickle loading (#485) * ENH harden Card by adding a flag to allow/disallow insecure pickle loading * improved typing for `trusted` arg in `Card` * TST updated test after `Card` hardening * ENH better exception handling when... | null |
CVE-2017-8069 | drivers/net/usb/rtl8150.c in the Linux kernel 4.9.x before 4.9.11 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist. | [
{
"commit_message": "[PATCH] rtl8150: Use heap buffers for all register access Allocating USB buffers on the stack is not portable, and no longer works on x86_64 (with VMAP_STACK enabled as per default). Fixes: 1da177e4c3f4 (\"Linux-2.6.12-rc2\") Signed-off-by: Ben Hutchings <ben@decadent.org.uk> Signed-off-by:... | n/a | |
GHSA-xr38-w74q-r8jv | Permissions not properly checked in Invenio-Drafts-Resources | null | [
{
"commit_message": "[PATCH] security: fix missing permission check of publish * Invenio-Drafts-Resources does not properly check permissions when a record is published. The vulnerability is exploitable in a default installation of InvenioRDM. An authenticated a user is able via REST API calls to publish draft ... | null |
CVE-2022-31153 | OpenZeppelin Contracts for Cairo account cannot process transactions on Goerli | OpenZeppelin Contracts for Cairo is a library for contract development written in Cairo for StarkNet, a decentralized ZK Rollup. Version 0.2.0 is vulnerable to an error that renders account contracts unusable on live networks. This issue affects all accounts (vanilla and ethereum flavors) in the v0.2.0 release of OpenZeppelin Contracts for Cairo, which are not whitelisted on StarkNet mainnet. Only goerli deployments of v0.2.0 accounts are affected. This faulty behavior is not observed in StarkNet's testing framework. This bug has been patched in v0.2.1. | [
{
"commit_message": "[PATCH] Eth account support (#361) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit * Create separate execute function * Add is_valid_eth_signature to account library * Add eth_execute to account library * Create eth account mock and test * Add missi... | CWE-664: Improper Control of a Resource Through its Lifetime |
CVE-2023-25165 | getHostByName Function Information Disclosure | Helm is a tool that streamlines installing and managing Kubernetes applications.`getHostByName` is a Helm template function introduced in Helm v3. The function is able to accept a hostname and return an IP address for that hostname. To get the IP address the function performs a DNS lookup. The DNS lookup happens when used with `helm install|upgrade|template` or when the Helm SDK is used to render a chart. Information passed into the chart can be disclosed to the DNS servers used to lookup the IP address. For example, a malicious chart could inject `getHostByName` into a chart in order to disclose values to a malicious DNS server. The issue has been fixed in Helm 3.11.1. Prior to using a chart with Helm verify the `getHostByName` function is not being used in a template to disclose any information you do not want passed to DNS servers. | [
{
"commit_message": "[PATCH] Update to func handling Signed-off-by: Matt Farina <matt@mattfarina.com> cmd/helm/install.go | 1 + cmd/helm/upgrade.go | 2 ++ pkg/action/action.go | 13 +++++++++---- pkg/action/install.go | 12 +++++++----- pkg/action/upgrade.go | 4 +++- pkg/engine/engine.... | CWE-200: Exposure of Sensitive Information to an Unauthorized Actor |
GHSA-86hw-hv7h-c3cx | null | [
{
"commit_message": "[PATCH] xss fixes .../views/advanced_settings/adminUsers.php | 8 +++--- .../views/advanced_settings/languages.php | 2 +- .../modules/admin/views/blog/blogpublish.php | 2 +- .../admin/views/ecommerce/discounts.php | 20 ++++++------- .../modules/admin/views/ecommerce/publish.... | null | |
GHSA-578p-fxmm-6229 | Potentially untrusted input is rendered as HTML in final output | null | [
{
"commit_message": "[PATCH] Fix CSS child selectors; don't load remote stylesheets CHANGELOG.md | 2 ++ mjml/mjml2html.py | 5 +++-- tests/testdata/css-inlining-expected.html | 2 +- tests/testdata/css-inlining.mjml | 9 ++++++++- 4 files changed, 14 in... | null |
CVE-2024-32982 | Litestar and Starlite affected by Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') | Litestar and Starlite is an Asynchronous Server Gateway Interface (ASGI) framework. Prior to 2.8.3, 2.7.2, and 2.6.4, a Local File Inclusion (LFI) vulnerability has been discovered in the static file serving component of LiteStar. This vulnerability allows attackers to exploit path traversal flaws, enabling unauthorized access to sensitive files outside the designated directories. Such access can lead to the disclosure of sensitive information or potentially compromise the server. The vulnerability is located in the file path handling mechanism within the static content serving function, specifically at `litestar/static_files/base.py`. This vulnerability is fixed in versions 2.8.3, 2.7.2, and 2.6.4. | [
{
"commit_message": "[PATCH] Merge pull request from GHSA-83pv-qr33-2vcf MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Fix for vulnerability introduced in #739, caused by failure to normalize the path part extracted from URL before serving data from a static directory... | CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') |
CVE-2023-1855 | A use-after-free flaw was found in xgene_hwmon_remove in drivers/hwmon/xgene-hwmon.c in the Hardware Monitoring Linux Kernel Driver (xgene-hwmon). This flaw could allow a local attacker to crash the system due to a race problem. This vulnerability could even lead to a kernel information leak problem. | [
{
"commit_message": "[PATCH] hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition In xgene_hwmon_probe, &ctx->workq is bound with xgene_hwmon_evt_work. Then it will be started. If we remove the driver which will call xgene_hwmon_remove to clean up, there may be unfinished work. The ... | CWE-416 | |
GHSA-f6rx-hf55-4255 | Sulu vulnerable to XXE in SVG File upload Inspector | null | [
{
"commit_message": "[PATCH] Merge commit from fork * Fix XEE issue with SvgFileInspector * Add manual check for <!ENTITY some SYSTEM or <!ENTITY some PUBLIC in XML parser * Add another entity example * Change regex * Disable network request in general * Update SvgFileInspectorTest.php * Remove unnecessary chec... | null |
GHSA-qg47-5px9-32g7 | Ansible Remote Code Execution | null | [
{
"commit_message": "[PATCH] Fixes to safe_eval lib/ansible/utils/__init__.py | 99 +++++++++++++++++++++++++---------- 1 file changed, 72 insertions(+), 27 deletions(-)",
"patch_text_b64": "RnJvbSA5OTg3OTNmZDBhYjU1NzA1ZDU3NTI3YTM4Y2VlNWU4M2Y1MzU5NzRjIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBKYW1lcyBDYW1tYX... | null |
CVE-2023-25669 | TensorFlow has Floating Point Exception in AvgPoolGrad with XLA | TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, if the stride and window size are not positive for `tf.raw_ops.AvgPoolGrad`, it can give a floating point exception. A fix is included in TensorFlow version 2.12.0 and version 2.11.1.
| [
{
"commit_message": "[PATCH] [tf2xla] Validate that stride and window size are positive PiperOrigin-RevId: 504866231 tensorflow/compiler/tests/pooling_ops_test.py | 30 +++++ .../compiler/tf2xla/kernels/pooling_ops.cc | 108 ++++++++++++------ tensorflow/compiler/xla/client/padding.cc | 10 ++ 3 files cha... | CWE-697: Incorrect Comparison |
GHSA-48pr-6hvf-39v3 | null | [
{
"commit_message": "[PATCH] mruby-compiler (scope_new): need to initialize nregs; fix #6509 `nregs` should not be smaller than `nlocals`. mrbgems/mruby-compiler/core/codegen.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSAxZmRkOTYxMDQxODBjYzBmYjVkM2NiMDg2YjA1YWI2NDU4OTExY... | null | |
GHSA-232p-59mg-f98p | Microweber Cross-site Scripting can result in redirection to a malicious site | null | [
{
"commit_message": "[PATCH] update composer.json | 6 +- composer.lock | 890 ++++++++++++++++++++++++-------------------------- 2 files changed, 433 insertions(+), 463 deletions(-)",
"patch_text_b64": "RnJvbSA2OGYwNzIxNTcxNjUzZGI4NjVhNWZhMDFjNzk4NjY0MmM4MmU5MTljIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBQ... | null |
CVE-2022-23650 | Use of Hard-coded Cryptographic Key in Netmaker | Netmaker is a platform for creating and managing virtual overlay networks using WireGuard. Prior to versions 0.8.5, 0.9.4, and 010.0, there is a hard-coded cryptographic key in the code base which can be exploited to run admin commands on a remote server if the exploiter know the address and username of the admin. This effects the server (netmaker) component, and not clients. This has been patched in Netmaker v0.8.5, v0.9.4, and v0.10.0. There are currently no known workarounds. | [
{
"commit_message": "[PATCH 1/2] added jwt fix logic/jwts.go | 23 ++++++++++++++++++++++- logic/serverconf.go | 29 +++++++++++++++++++++++++++++ main.go | 2 +- 3 files changed, 52 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSA3ODljYjI3ZDQ4YjA4OTFmNTdiMTRjMGVlMGRmOGZiODNiMzNjMm... | CWE-321: Use of Hard-coded Cryptographic Key |
GHSA-jx7x-rf3f-j644 | Jenkins CloudBees CD Plugin vulnerable to arbitrary file deletion | null | [
{
"commit_message": "[PATCH] SECURITY-3237-3238 .../electricflow/ElectricFlowClient.java | 18 +++---------- .../plugins/electricflow/FileHelper.java | 27 ++++++------------- 2 files changed, 11 insertions(+), 34 deletions(-)",
"patch_text_b64": "RnJvbSBlNDVjYTg0MjhhZTQ1ZjQ1Y2EwNzYxMWU4MDJlYWEwZjE0... | null |
GHSA-68cp-h96v-gg3x | ChakraCore RCE Vulnerability | null | [
{
"commit_message": "[PATCH] [CVE-2017-0224, CVE-2017-0235] Chakra - JavascriptPromise::AsyncSpawnStep method invocation issue While invoking then and catch functions on the promise returned by async function we were directly invoking those without checking. Overriding those methods with tagged int can cause wr... | null |
GHSA-22p3-qrh9-cx32 | URL previews of unusual or maliciously-crafted pages can crash Synapse media repositories or Synapse monoliths | null | [
{
"commit_message": "[PATCH] Merge pull request from GHSA-22p3-qrh9-cx32 * Make _iterate_over_text easier to read by using simple data structures * Prefer a set of tags to ignore In my tests, it's 4x faster to check for containment in a set of this size * Add a stack size limit to _iterate_over_text * Continue ... | null |
GHSA-6rhq-w4qm-ccpf | null | [
{
"commit_message": "[PATCH] patch 8.2.4154: ml_get error when exchanging windows in Visual mode Problem: ml_get error when exchanging windows in Visual mode. Solution: Correct end of Visual area when entering another buffer. src/testdir/test_visual.vim | 10 ++++++++++ src/version.c | 2 ++ s... | null | |
GHSA-2xg6-qhwr-gp7p | null | [
{
"commit_message": "[PATCH] Do not put database names as html js/replication.js | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-)",
"patch_text_b64": "RnJvbSA4NjA3M2Q1MzJhZWQ2NTY1NTBjYjczMWFhNWI0Mjg4YjEyNmFlN2E2IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiA9P1VURi04P3E/TWljaGFsPTIwPUM0PThDaWhhPU... | null | |
GHSA-x8gw-xhgw-c97r | null | [
{
"commit_message": "[PATCH] ALSA: seq: Fix missing NULL check at remove_events ioctl snd_seq_ioctl_remove_events() calls snd_seq_fifo_clear() unconditionally even if there is no FIFO assigned, and this leads to an Oops due to NULL dereference. The fix is just to add a proper NULL check. Reported-by: Dmitry Vy... | null | |
GHSA-g8mr-fgfg-5qpc | Koa Vulnerable to Open Redirect via Trailing Double-Slash (//) in back Redirect Logic | null | [
{
"commit_message": "[PATCH] fix: normalize referer before redirect (#1908) Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> __tests__/response/back.test.js | 22 +++++++++++++++++++--- lib/response.js | 6 ------ 2 files changed, 19 insertions(+), 9 deletions(-)",
"patch_... | null |
CVE-2021-38562 | Best Practical Request Tracker (RT) 4.2 before 4.2.17, 4.4 before 4.4.5, and 5.0 before 5.0.2 allows sensitive information disclosure via a timing attack against lib/RT/REST2/Middleware/Auth.pm. | [
{
"commit_message": "[PATCH] Always check password to avoid timing side channel attacks in REST2 basic auth This addresses CVE-2021-38562. lib/RT/REST2/Middleware/Auth.pm | 9 +++++++++ 1 file changed, 9 insertions(+)",
"patch_text_b64": "RnJvbSA3MDc0OWJiNjZjYjEzZGQ3MGJkNTMzNDBjMzcxMDM4YTVmM2NhNTdjIE1vbiBTZX... | n/a | |
CVE-2019-20629 | An issue was discovered in libgpac.a in GPAC before 0.8.0, as demonstrated by MP4Box. It contains a heap-based buffer over-read in gf_m2ts_process_pmt in media_tools/mpegts.c that can cause a denial of service via a crafted MP4 file. | [
{
"commit_message": "[PATCH] fixed potential crash in TS - cf #1264 src/media_tools/mpegts.c | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-)",
"patch_text_b64": "RnJvbSAyMzIwZWI3M2FmYmE3NTNiMzliNzE0N2JlOTFmN2JlN2FmYzBlZWI3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBqZWFubGYgPGplYW5sZkB1c2... | n/a | |
CVE-2021-43848 | Unititialized memory access in h2o | h2o is an open source http server. In code prior to the `8c0eca3` commit h2o may attempt to access uninitialized memory. When receiving QUIC frames in certain order, HTTP/3 server-side implementation of h2o can be misguided to treat uninitialized memory as HTTP/3 frames that have been received. When h2o is used as a reverse proxy, an attacker can abuse this vulnerability to send internal state of h2o to backend servers controlled by the attacker or third party. Also, if there is an HTTP endpoint that reflects the traffic sent from the client, an attacker can use that reflector to obtain internal state of h2o. This internal state includes traffic of other connections in unencrypted form and TLS session tickets. This vulnerability exists in h2o server with HTTP/3 support, between commit 93af138 and d1f0f65. None of the released versions of h2o are affected by this vulnerability. There are no known workarounds. Users of unreleased versions of h2o using HTTP/3 are advised to upgrade immediately. | [
{
"commit_message": "[PATCH] postpone stream shutdown by H3 frame parsers lib/http3/server.c | 20 +++++++++++--------- 1 file changed, 11 insertions(+), 9 deletions(-)",
"patch_text_b64": "RnJvbSA4YzBlY2EzZDliYzFmMDhlN2M2YmRmNTc2NDVmM2Q1NGFlZDdkODQ0IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBLYXp1aG8gT2t1IDx... | CWE-908: Use of Uninitialized Resource |
CVE-2024-58103 | Square Wire before 5.2.0 does not enforce a recursion limit on nested groups in ByteArrayProtoReader32.kt and ProtoReader.kt. | [
{
"commit_message": "[PATCH] Enforce recursion limit on nested groups .../squareup/wire/ByteArrayProtoReader32.kt | 13 ++++++++++++- .../kotlin/com/squareup/wire/ProtoReader.kt | 13 ++++++++++++- .../com/squareup/wire/ProtoReader32Test.kt | 18 ++++++++++++++++++ .../com/squareup/wire/ProtoReaderTest.k... | CWE-674 Uncontrolled Recursion | |
PYSEC-2023-77 | null | [
{
"commit_message": "[PATCH] Merge pull request from GHSA-3p37-3636-q8wv in dynarray_make_setter, the length is copied before the data. when the dst and src arrays do not overlap, this is not a problem. however, when the dst and src are the same dynarray, this can lead to a store-before-load, leading any array ... | null | |
CVE-2023-3479 | Cross-site Scripting (XSS) - Reflected in hestiacp/hestiacp | Cross-site Scripting (XSS) - Reflected in GitHub repository hestiacp/hestiacp prior to 1.7.8. | [
{
"commit_message": "[PATCH] Fix reflected XXS issue web/templates/pages/debug_panel.php | 22 ++++++++++++++-------- 1 file changed, 14 insertions(+), 8 deletions(-)",
"patch_text_b64": "RnJvbSAyMzI2YWE1MjVhN2JhMTQ1MTNhZjc4M2YyOWNiNWU2MmE0NzZlNjdhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBKYWFwIE1hcmN1cyA8O... | CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
CVE-2025-52575 | EspoCRM vulnerable to LDAP Injection through Improper Neutralization of Special Elements | EspoCRM is an Open Source CRM (Customer Relationship Management) software. EspoCRM versions 9.1.6 and earlier are vulnerable to blind LDAP Injection when LDAP authentication is enabled. A remote, unauthenticated attacker can manipulate LDAP queries by injecting crafted input containing wildcard characters (e.g., *). This may allow the attacker to bypass authentication controls, enumerate valid usernames, or retrieve sensitive directory information depending on the LDAP server configuration. This was fixed in version 9.1.7. | [
{
"commit_message": "[PATCH] fix ldap query .../Core/Authentication/Ldap/LdapLogin.php | 32 ++++++++++++------- 1 file changed, 21 insertions(+), 11 deletions(-)",
"patch_text_b64": "RnJvbSA4NjQ5ZjFhYzBjZTcxNGIyYzMxNzI3YmNhM2RkOTVkMDZlMTczMzdmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBZdXJpIEt1em5ldHNvdi... | CWE-90: Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection') |
GHSA-h7h7-6mx3-r89v | Fyrox has unsound usages of `Vec::from_raw_parts` | null | [
{
"commit_message": "[PATCH] #630 transmute_vec_as_bytes potential fix (#662) * chore(#630): reformatting transmute_vec_as_bytes to properly handle padding for usize and f32 types * chore(630): added bytemuck to fyrox-core and fyrox-impl . Updated transmute_vec_as_bytes to have the generic T implement pod trai... | null |
GHSA-8535-hvm8-2hmv | Grav is vulnerable to Server-Side Template Injection (SSTI) via Forms | null | [
{
"commit_message": "[PATCH] Expand SSTI sandbox blacklist to block known attack vectors Security fixes for: - GHSA-662m-56v4-3r8f: SSTI sandbox bypass via nested evaluate_twig - GHSA-858q-77wx-hhx6: Privilege escalation via grav.user/scheduler - GHSA-8535-hvm8-2hmv: Context leak via Forms _context access - GHS... | null |
PYSEC-2021-563 | null | [
{
"commit_message": "[PATCH] Fix segfault/heap buffer overflow in `{Experimental,}DatasetToTFRecord` where dataset is numeric. Code assumes only strings inputs and then interprets numbers as valid `tstring`s. Then, when trying to compute the CRC of the record this results in heap buffer overflow. PiperOrigin-Re... | null | |
GHSA-6jqj-f58p-mrw3 | Denial of Service in TenderMint | null | [
{
"commit_message": "[PATCH] consensus: Do not allow signatures for a wrong block in commits Closes #4926 The dump consensus state had this: \"last_commit\": { \"votes\": [ \"Vote{0:04CBBF43CA3E 385085/00/2(Precommit) 1B73DA9FC4C8 42C97B86D89D @ 2020-05-27T06:46:51.042392895Z}\", \"Vote{1:055799E028FA 385085/00... | null |
CVE-2025-1026 | Versions of the package spatie/browsershot before 5.0.5 are vulnerable to Improper Input Validation due to improper URL validation through the setUrl method, which results in a Local File Inclusion allowing the attacker to read sensitive files.
**Note:**
This is a bypass of the fix for [CVE-2024-21549](https://security.snyk.io/vuln/SNYK-PHP-SPATIEBROWSERSHOT-8533023). | [
{
"commit_message": "[PATCH] validate url src/Browsershot.php | 6 +++++- src/Exceptions/FileUrlNotAllowed.php | 5 +++++ tests/BrowsershotTest.php | 6 ++++++ 3 files changed, 16 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSBlMzI3Mzk3NDUwNjg2NWEyNGZiYjViNjViNTM0ZDhkNGI4Z... | Improper Input Validation | |
CVE-2020-28097 | The vgacon subsystem in the Linux kernel before 5.8.10 mishandles software scrollback. There is a vgacon_scrolldelta out-of-bounds read, aka CID-973c096f6a85. | [
{
"commit_message": "[PATCH] vgacon: remove software scrollback support MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Yunhai Zhang recently fixed a VGA software scrollback bug in commit ebfdfeeae8c0 (\"vgacon: Fix for missing check in scrollback handling\"), but that ... | n/a | |
GHSA-cqxx-66wh-8pjw | Improper Removal of Sensitive Information Before Storage or Transfer in irrd | null | [
{
"commit_message": "[PATCH] Correct missing password hash removal Auth has removal was broken in a number of cases for all 4.2 versions: - All queries that returned the object text for a mntner when all hash names (MD5-PW etc.) in the text were lower or mixed case - Queries for the auth attribute in GraphQL qu... | null |
CVE-2021-21293 | Unbounded connection acceptance leads to file handle exhaustion | blaze is a Scala library for building asynchronous pipelines, with a focus on network IO. All servers running blaze-core before version 0.14.15 are affected by a vulnerability in which unbounded connection acceptance leads to file handle exhaustion. Blaze, accepts connections unconditionally on a dedicated thread pool. This has the net effect of amplifying degradation in services that are unable to handle their current request load, since incoming connections are still accepted and added to an unbounded queue. Each connection allocates a socket handle, which drains a scarce OS resource. This can also confound higher level circuit breakers which work based on detecting failed connections. The vast majority of affected users are using it as part of http4s-blaze-server <= 0.21.16. http4s provides a mechanism for limiting open connections, but is enforced inside the Blaze accept loop, after the connection is accepted and the socket opened. Thus, the limit only prevents the number of connections which can be simultaneously processed, not the number of connections which can be held open. The issue is fixed in version 0.14.15 for "NIO1SocketServerGroup". A "maxConnections" parameter is added, with a default value of 512. Concurrent connections beyond this limit are rejected. To run unbounded, which is not recommended, set a negative number. The "NIO2SocketServerGroup" has no such setting and is now deprecated. There are several possible workarounds described in the refrenced GitHub Advisory GHSA-xmw9-q7x9-j5qc. | [
{
"commit_message": "[PATCH 01/18] Create a separate acceptor pool on which we can block .../channel/nio1/NIO1SocketServerGroup.scala | 37 +++--- .../blaze/channel/nio1/SelectorLoop.scala | 109 +++++++++--------- 2 files changed, 79 insertions(+), 67 deletions(-)",
"patch_text_b64": "RnJvbSBiZWNkNjhiY... | CWE-400: Uncontrolled Resource Consumption |
CVE-2021-35413 | A remote code execution (RCE) vulnerability in course_intro_pdf_import.php of Chamilo LMS v1.11.x allows authenticated attackers to execute arbitrary code via a crafted .htaccess file. | [
{
"commit_message": "[PATCH] Add disable_dangerous_file in unzip_uploaded_file main/inc/lib/fileUpload.lib.php | 2 ++ 1 file changed, 2 insertions(+)",
"patch_text_b64": "RnJvbSAyZTVjMDA0YjU3ZDU1MTY3OGExODE1NTAwZWY5MTUyNGJhN2JiNzU3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBKdWxpbyBNb250b3lhIDxndWdsaTEwMEBnb... | n/a | |
GHSA-95hx-62rh-gg96 | Potential XSS injection In PrestaShop contactform | null | [
{
"commit_message": "[PATCH] //Initial commit composer.json | 19 ++ config.xml | 12 + contactform.php | 311 +++++++++++++++++++++++++ logo.png | Bin 0 -> 1807 bytes views/templates/widget/contactform.tpl ... | null |
CVE-2013-2022 | Multiple cross-site scripting (XSS) vulnerabilities in actionscript/Jplayer.as in the Flash SWF component (jplayer.swf) in jPlayer before 2.2.23 allow remote attackers to inject arbitrary web script or HTML via the (1) jQuery or (2) id parameters, a different vulnerability than CVE-2013-1942 and CVE-2013-2023, as demonstrated by using the alert function in the jQuery parameter. NOTE: these are the same parameters as CVE-2013-1942, but the fix for CVE-2013-1942 uses a blacklist for the jQuery parameter. | [
{
"commit_message": "[PATCH] Security Fox of Flash SWF that had enabled Cross Site Scripting (XSS) actionscript/Jplayer.as | 2 +- .../happyworm/jPlayer/JplayerStatus.as | 2 +- jquery.jplayer/Jplayer.swf | Bin 13742 -> 13749 bytes jquery.jplayer/jquery.jplayer.... | n/a | |
GHSA-3hwx-c6cp-q972 | Publify vulnerable to cross site scripting | null | [
{
"commit_message": "[PATCH] Refuse html files as resources even if declared to be plain text .../app/uploaders/resource_uploader.rb | 30 +++++++++---------- .../admin/resources_controller_spec.rb | 24 +++++++++++++++ 2 files changed, 38 insertions(+), 16 deletions(-)",
"patch_text_b64": "RnJv... | null |
CVE-2015-10035 | gperson angular-test-reporter data-server.js addTest sql injection | A vulnerability was found in gperson angular-test-reporter and classified as critical. This issue affects the function getProjectTables/addTest of the file rest-server/data-server.js. The manipulation leads to sql injection. The patch is named a29d8ae121b46ebfa96a55a9106466ab2ef166ae. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217715. | [
{
"commit_message": "[PATCH] Escaping to prevent sql injections & others issues app/app.js | 2 +- rest-server/data-server.js | 5 +++-- 2 files changed, 4 insertions(+), 3 deletions(-)",
"patch_text_b64": "RnJvbSBhMjlkOGFlMTIxYjQ2ZWJmYTk2YTU1YTkxMDY0NjZhYjJlZjE2NmFlIE1vbiBTZXAgMTcgMDA6MDA6MDA... | CWE-89 SQL Injection |
CVE-2018-7651 | index.js in the ssri module before 5.2.2 for Node.js is prone to a regular expression denial of service vulnerability in strict mode functionality via a long base64 hash string. | [
{
"commit_message": "[PATCH] fix(security): tweak strict SRI regex (#10) The previous form was vulnerable to ReDoS attacks, by crafting exceptionally long base64 hash strings. This issue only affected consumers using the opts.strict option. index.js | 2 +- test/integrity.js | 15 +++++++++------ test/s... | n/a | |
CVE-2023-25158 | Unfiltered SQL Injection in Geotools | GeoTools is an open source Java library that provides tools for geospatial data. GeoTools includes support for OGC Filter expression language parsing, encoding and execution against a range of datastore. SQL Injection Vulnerabilities have been found when executing OGC Filters with JDBCDataStore implementations. Users are advised to upgrade to either version 27.4 or to 28.2 to resolve this issue. Users unable to upgrade may disable `encode functions` for PostGIS DataStores or enable `prepared statements` for JDBCDataStores as a partial mitigation. | [
{
"commit_message": "[PATCH] Merge pull request from GHSA-99c3-qc2q-p94m .../org/geotools/data/jdbc/FilterToSQL.java | 40 +++-- .../java/org/geotools/jdbc/EscapeSql.java | 24 +++ .../java/org/geotools/jdbc/SQLDialect.java | 86 +++++++++ .../geotools/data/jdbc/FilterToSQLTest.java | 14 ++ .../org/... | CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') |
CVE-2023-29014 | Goobi viewer Core Reflected Cross-Site Scripting Vulnerability Using LOGID Parameter | The Goobi viewer is a web application that allows digitised material to be displayed in a web browser. A reflected cross-site scripting vulnerability has been identified in Goobi viewer core prior to version 23.03 when evaluating the LOGID parameter. An attacker could trick a user into following a specially crafted link to a Goobi viewer installation, resulting in the execution of malicious script code in the user's browser. The vulnerability has been fixed in version 23.03. | [
{
"commit_message": "[PATCH] Only allow setting logId to a value matching [\\w-]+ refs #24571 .../viewer/managedbeans/ActiveDocumentBean.java | 13 ++++++++++--- 1 file changed, 10 insertions(+), 3 deletions(-)",
"patch_text_b64": "RnJvbSBjMjllZmU2MGU3NDVhOTRkMDNkZWJjMTc2ODFjNDk1MGYzOTE3NDU1IE1vbiBTZXAgM... | CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
GHSA-94j8-ww24-pr2v | null | [
{
"commit_message": "[PATCH] mime-actions: use file metadata for trusting desktop files Currently we only trust desktop files that have the executable bit set, and don't replace the displayed icon or the displayed name until it's trusted, which prevents for running random programs by a malicious desktop file. H... | null | |
GHSA-mwgq-j58h-pv6j | null | [
{
"commit_message": "[PATCH] Bug 702582, CVE 2020-15900 Memory Corruption in Ghostscript 9.52 Fix the 'rsearch' calculation for the 'post' size to give the correct size. Previous calculation would result in a size that was too large, and could underflow to max uint32_t. Also fix 'rsearch' to return the correct... | null | |
GHSA-f2m2-4q6r-cwc4 | simple-admin-core SQL Injection vulnerability | null | [
{
"commit_message": "[PATCH] fix: optimize role code validator to avoid sql injects api/desc/core/role.api | 2 +- api/internal/handler/routes.go | 2 +- api/internal/types/types.go | 4 ++-- core.json | 2 +- 4 files changed, 5 insertions(+), 5 deletions(-)",
"patch_text_b64": "... | null |
CVE-2020-19491 | There is an invalid memory access bug in cgif.c that leads to a Segmentation fault in sam2p 0.49.4. A crafted input will lead to a denial of service or possibly unspecified other impact. | [
{
"commit_message": "[PATCH] fixed segfault in GIF reading; this fixes https://github.com/pts/sam2p/issues/67 cgif.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSAxZDYyY2Y4OTY0YmZjYWZhNjU2MWM0YzNiYjY2ZDRhYTRjNTI5YTczIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBQZXRlciBTemF... | n/a | |
CVE-2022-1782 | Cross-site Scripting (XSS) - Generic in erudika/para | Cross-site Scripting (XSS) - Generic in GitHub repository erudika/para prior to v1.45.11. | [
{
"commit_message": "[PATCH] added option to escape HTML when compiling Mustache templates .../java/com/erudika/para/core/utils/Utils.java | 14 ++++++++++++-- .../com/erudika/para/core/utils/UtilsTest.java | 8 ++++---- 2 files changed, 16 insertions(+), 6 deletions(-)",
"patch_text_b64": "RnJvbSA5ZD... | CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
CVE-2020-26261 | user-readable api tokens in systemd units | jupyterhub-systemdspawner enables JupyterHub to spawn single-user notebook servers using systemd. In jupyterhub-systemdspawner before version 0.15 user API tokens issued to single-user servers are specified in the environment of systemd units. These tokens are incorrectly accessible to all users. In particular, the-littlest-jupyterhub is affected, which uses systemdspawner by default. This is patched in jupyterhub-systemdspawner v0.15 | [
{
"commit_message": "[PATCH 1/4] changelog for v0.14 CHANGELOG.md | 6 ++++++ 1 file changed, 6 insertions(+)",
"patch_text_b64": "RnJvbSA0Y2ZmMDc2OWY3MWViZjhlNGM5MTg2NjA0YzU3ODE2MTQ4NjYyM2IzIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBNaW4gUksgPGJlbmphbWlucmtAZ21haWwuY29tPgpEYXRlOiBUaHUsIDMgRGVjIDIwMjAgMTI6MD... | CWE-668: Exposure of Resource to Wrong Sphere |
CVE-2025-62375 | go-witness Improper Verification of AWS EC2 Identity Documents | go-witness and witness are Go modules for generating attestations. In go-witness versions 0.8.6 and earlier and witness versions 0.9.2 and earlier the AWS attestor improperly verifies AWS EC2 instance identity documents. Verification can incorrectly succeed when a signature is not present or is empty, and when RSA signature verification fails. The attestor also embeds a single legacy global AWS public certificate and does not account for newer region specific certificates issued in 2024, making detection of forged documents difficult without additional trusted region data. An attacker able to supply or intercept instance identity document data (such as through Instance Metadata Service impersonation) can cause a forged identity document to be accepted, leading to incorrect trust decisions based on the attestation. This is fixed in go-witness 0.9.1 and witness 0.10.1. As a workaround, manually verify the included identity document, signature, and public key with standard tools (for example openssl) following AWS’s verification guidance, or disable use of the AWS attestor until upgraded. | [
{
"commit_message": "[PATCH] add the current valid AWS certs to valid AWS identity documents (#576) * add the current valid AWS certs to valid AWS identity documents * fallback to IID region if it's not present in the config Signed-off-by: John Kjell <john.kjell@control-plane.io> Makefile ... | CWE-295: Improper Certificate Validation |
PYSEC-2024-34 | null | [
{
"commit_message": "[PATCH 1/3] Delete option to login via SSH into the node/server container docker/node-and-server.Dockerfile | 16 +++++----------- sshd_config | 16 ---------------- 2 files changed, 5 insertions(+), 27 deletions(-) delete mode 100644 sshd_config",
"patch_text_b64": ... | null | |
CVE-2019-13218 | Division by zero in the predict_point function in stb_vorbis through 2019-03-04 allows an attacker to cause a denial of service by opening a crafted Ogg Vorbis file. | [
{
"commit_message": "[PATCH] Fix seven bugs discovered and fixed by ForAllSecure: CVE-2019-13217: heap buffer overflow in start_decoder() CVE-2019-13218: stack buffer overflow in compute_codewords() CVE-2019-13219: uninitialized memory in vorbis_decode_packet_rest() CVE-2019-13220: out-of-range read in draw_lin... | n/a | |
GHSA-mv4h-qm24-x4gh | Converse.js Exposure of Sensitive Information | null | [
{
"commit_message": "[PATCH] Don't allow PEP bookmarks if #publish-options is not advertised spec/bookmarks.js | 565 ++++++++++++++++++++------------------ spec/chatbox.js | 8 +- spec/chatroom.js | 482 ++++++++++++++++---------------- spec/protocol.js | 2 +- src/converse-... | null |
GHSA-qwgp-hcv2-wppx | null | [
{
"commit_message": "[PATCH] Coder path traversal is not authorized, bug report provided by Masaaki Chida ChangeLog | 5 +++++ magick/module.c | 9 +++++++++ magick/xml-tree.c | 5 ++++- 3 files changed, 18 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSBmYzYwODBmMTMyMWZkMjFlODZlZjkxNjE5NWNj... | null | |
GHSA-xvfg-m24j-r4pm | null | [
{
"commit_message": "[PATCH] Fix zero stripping in %g number formatting. Reported by pwnhacker0x18. #1149 src/lj_strfmt_num.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSAzNDNjZTBlZGFmMzkwNmE2MjAyMjkzNjE3NWIyZjU0MTAwMjRjYmZjIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBNaW... | null | |
CVE-2013-5634 | arch/arm/kvm/arm.c in the Linux kernel before 3.10 on the ARM platform, when KVM is used, allows host OS users to cause a denial of service (NULL pointer dereference, OOPS, and host OS crash) or possibly have unspecified other impact by omitting vCPU initialization before a KVM_GET_REG_LIST ioctl call. | [
{
"commit_message": "[PATCH] ARM: KVM: prevent NULL pointer dereferences with KVM VCPU ioctl Some ARM KVM VCPU ioctls require the vCPU to be properly initialized with the KVM_ARM_VCPU_INIT ioctl before being used with further requests. KVM_RUN checks whether this initialization has been done, but other ioctls d... | n/a | |
CVE-2024-45309 | OneDev vulnerable to arbitrary file reading for unauthenticated user | OneDev is a Git server with CI/CD, kanban, and packages. A vulnerability in versions prior to 11.0.9 allows unauthenticated users to read arbitrary files accessible by the OneDev server process. This issue has been fixed in version 11.0.9. | [
{
"commit_message": "[PATCH] fix: Arbitrary file reading exists in Onedev 11.0.8(latest) (OD-2050) .../web/page/project/blob/ProjectBlobPage.java | 3 +++ .../builds/detail/report/BuildReportPage.java | 4 +++- .../page/project/commits/CommitDetailPage.java | 5 +++++ .../server/web/resource/ArtifactR... | CWE-200: Exposure of Sensitive Information to an Unauthorized Actor |
CVE-2021-4247 | OWASP NodeGoat Query Parameter research.js denial of service | A vulnerability has been found in OWASP NodeGoat and classified as problematic. This vulnerability affects unknown code of the file app/routes/research.js of the component Query Parameter Handler. The manipulation leads to denial of service. The attack can be initiated remotely. The name of the patch is 4a4d1db74c63fb4ff8d366551c3af006c25ead12. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216184. | [
{
"commit_message": "[PATCH] Fix TypeError when server-side request fails In addition to the intended SSRF vulnerability, it was possible to crash the server with maliciously chosen query parameters. Closes #225 app/routes/research.js | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-)",
"patch_text_... | CWE-404 Denial of Service |
GHSA-c6x7-hwq8-gfmj | null | [
{
"commit_message": "[PATCH] fix: potential vulnerable cloned functions (#4996) Fix potential vulnerable cloned functions: Security: update Lua struct package for security. src/redis/lua/struct/lua_struct.c | 10 ++++------ 1 file changed, 4 insertions(+), 6 deletions(-)",
"patch_text_b64": "RnJvbSA0NzNlMDAy... | null | |
GHSA-9vwf-54m9-gc4f | snipe-it is vulnerable to Improper Access Control | null | [
{
"commit_message": "[PATCH] Update AssetModelsController.php app/Http/Controllers/AssetModelsController.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSAxNjk5YzA5NzU4ZTU2Zjc0MDQzNzY3NGE4ZDZiYTM2NDQzMzk5ZjI0IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBIYXhhdHJvbiA8NzY0NzU0N... | null |
GHSA-g4w7-3qr8-5623 | Improper type usage in rusqlite | null | [
{
"commit_message": "[PATCH] Ensure type use for auxdata is repr(C) src/functions.rs | 22 ++++++++++++++++------ 1 file changed, 16 insertions(+), 6 deletions(-)",
"patch_text_b64": "RnJvbSA3MWIyZjUxODdiMGNiYWNlM2Y4YjZmZjUzNDMyZmYyY2EwZGVmY2YwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBUaG9tIENoaW92b2xvbmkgP... | null |
CVE-2025-62157 | Argo Workflows exposes artifact repository credentials in workflow-controller logs | Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. Argo Workflows versions prior to 3.6.12 and versions 3.7.0 through 3.7.2 expose artifact repository credentials in plaintext in workflow-controller pod logs. An attacker with permissions to read pod logs in a namespace running Argo Workflows can read the workflow-controller logs and obtain credentials to the artifact repository. Update to versions 3.6.12 or 3.7.3 to remediate the vulnerability. No known workarounds exist. | [
{
"commit_message": "[PATCH] Merge commit from fork Signed-off-by: Alan Clucas <alan@clucas.org> Co-authored-by: Sergey K. <r081n4k@gmail.com> workflow/controller/config.go | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSAxOGFkNTEzOGI2YmNiMmFiYTA0ZTAwYjRlYzY1N2JjNmI4ZmFk... | CWE-522: Insufficiently Protected Credentials |
CVE-2023-34458 | mx-chain-go's relayed transactions always increment nonce | mx-chain-go is the official implementation of the MultiversX blockchain protocol, written in golang. When executing a relayed transaction, if the inner transaction failed, it would have increased the inner transaction's sender account nonce. This could have contributed to a limited DoS attack on a targeted account. The fix is a breaking change so a new flag `RelayedNonceFixEnableEpoch` was needed. This was a strict processing issue while validating blocks on a chain. This vulnerability has been patched in version 1.4.17. | [
{
"commit_message": "[PATCH 1/9] - added semi-integration test .../vm/txsFee/relayedMoveBalance_test.go | 30 +++++++++++++++++++ 1 file changed, 30 insertions(+)",
"patch_text_b64": "RnJvbSA1ZmI0MTEyZWQyOGRkZjRmNDM3Y2RlM2UxYTc0NGI3NjI2ODJmMmNmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBqdWxlczAxIDxpdWxp... | CWE-400: Uncontrolled Resource Consumption |
GHSA-fpf5-w967-rr2m | Signal K Server Vulnerable to Unauthenticated Information Disclosure via Exposed Endpoints | null | [
{
"commit_message": "[PATCH] Merge commit from fork Add authentication to routes hasAnalyzer, availablePaths and serialports. src/tokensecurity.js | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSBlYWQyYTAzZDg5OTQ5NjljYWZjY2EwMzIwYWJlZTE2ZjBlNjZlN2E5IE1vbiBTZXAgMTcgMDA6MDA... | null |
GHSA-7pf9-7cff-f854 | sosreport Exposure of Sensitive Information vulnerability | null | [
{
"commit_message": "[PATCH] [ovirt] answer files: Filter out all password keys Instead of hard-coding specific keys and having to maintain them over time, replace the values of all keys that have 'password' in their name. I think this covers all our current and hopefully future keys. It might add \"false posit... | null |
GHSA-fj28-869x-vv5g | SimpleSAMLphp InfoCard module Incorrect signature verification | null | [
{
"commit_message": "[PATCH] bugfix: Make sure to properly check the output of openssl_verify(). lib/RP/Zend_InfoCard_Xml_Security.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSA2M2I4NGNjODM3ZWE2MmJmODdmNGJmNGFmMjliNDQyMGY0OTMxMWE5IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9... | null |
CVE-2022-0197 | Cross-Site Request Forgery (CSRF) in phoronix-test-suite/phoronix-test-suite | phoronix-test-suite is vulnerable to Cross-Site Request Forgery (CSRF) | [
{
"commit_message": "[PATCH] phoromatic: Some additional input sanitization and starting on some CSRF token handling pts-core/objects/pts_strings.php | 2 +- .../phoromatic/pages/phoromatic_local_suites.php | 4 ++-- pts-core/phoromatic/pages/phoromatic_schedules.php | 8 ++++---- pts-... | CWE-352 Cross-Site Request Forgery (CSRF) |
CVE-2022-39214 | Authenticated users of Combodo iTop can take over any account | Combodo iTop is an open source, web-based IT service management platform. Prior to versions 2.7.8 and 3.0.2-1, a user who can log in on iTop is able to take over any account just by knowing the account's username. This issue is fixed in versions 2.7.8 and 3.0.2-1. | [
{
"commit_message": "[PATCH] =?UTF-8?q?N=C2=B05394=20-=20use=20session=20for=20the=20F?= =?UTF-8?q?SM?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit application/loginbasic.class.inc.php | 4 +++- application/loginexternal.class.inc.php | 4 +++- application/loginf... | CWE-863: Incorrect Authorization |
CVE-2017-6199 | A remote attacker could bypass the Sandstorm organization restriction before build 0.203 via a comma in an email-address field. | [
{
"commit_message": "[PATCH] Validate e-mail addresses more strictly. shell/imports/server/email.js | 36 +++++++++++++++++++ shell/packages/sandstorm-db/db.js | 4 ++- .../accounts/email-token/token-server.js | 2 +- shell/server/admin-server.js | 7 ++-- 4 file... | n/a | |
GHSA-2m8v-572m-ff2v | Command Injection Vulnerability | null | [
{
"commit_message": "[PATCH] docker, processLoad fixed potential security issue lib/docker.js | 64 ++++++++++++++++++++++++++++++++++++------------ lib/internet.js | 4 +-- lib/network.js | 28 ++++++++++++++------- lib/processes.js | 9 ++++++- 4 files changed, 77 insertions(+), 28 deletions(-)",
"pat... | null |
GHSA-m4g9-5mg6-gfr3 | Liferay Portal Commerce is vulnerable to XSS through account "name" field | null | [
{
"commit_message": "[PATCH] LPD-15231 Escape account name .../resources/META-INF/resources/commerce_order/general.jsp | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSBlNmQ0OWVkYTE5NjY3NmFhM2ZlY2IyNmY2YThiYTEwMDYwMmQwYzM2IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBTdGVmYW5... | null |
GHSA-m6v2-2pmh-qf44 | null | [
{
"commit_message": "[PATCH] [backend] only allow plain files in cpio_sender No devices, sockets, directories, symlinks please... src/backend/BSHTTP.pm | 19 +++++++++++++++---- 1 file changed, 15 insertions(+), 4 deletions(-)",
"patch_text_b64": "RnJvbSBiYTI3YzkxMzUxODc4YmMyOTdlYzRiYWJhMGJkNDg4YTJmM2I1NjhkI... | null | |
GHSA-j8rq-pgqm-7hx7 | null | [
{
"commit_message": "[PATCH] smacker: add sanity check for length in smacker_decode_tree() Signed-off-by: Michael Niedermayer <michaelni@gmx.at> Bug-Id: 1098 Cc: libav-stable@libav.org Signed-off-by: Sean McGovern <gseanmcg@gmail.com> libavcodec/smacker.c | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(... | null | |
CVE-2013-0217 | Memory leak in drivers/net/xen-netback/netback.c in the Xen netback functionality in the Linux kernel before 3.7.8 allows guest OS users to cause a denial of service (memory consumption) by triggering certain error conditions. | [
{
"commit_message": "[PATCH] xen/netback: don't leak pages on failure in xen_netbk_tx_check_gop. Signed-off-by: Matthew Daley <mattjd@gmail.com> Reviewed-by: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com> Acked-by: Ian Campbell <ian.campbell@citrix.com> Acked-by: Jan Beulich <JBeulich@suse.com> Signed-off-by: D... | n/a | |
GHSA-vqwg-4v6f-h6x5 | Stored XSS vulnerability in Matrix Project Plugin | null | [
{
"commit_message": "[PATCH] [SECURITY-2017] src/main/java/hudson/matrix/LabelAxis.java | 32 ++++++++++++++----- .../hudson/matrix/LabelAxis/config.jelly | 2 +- 2 files changed, 25 insertions(+), 9 deletions(-)",
"patch_text_b64": "RnJvbSA3OGNjNjA1NTYzMDQ5NjVmZmIyZGQ4YzAxN2JmNjFkNGYxNTNmNWVhIE1vbiB... | null |
CVE-2015-8863 | Off-by-one error in the tokenadd function in jv_parse.c in jq allows remote attackers to cause a denial of service (crash) via a long JSON-encoded number, which triggers a heap-based buffer overflow. | [
{
"commit_message": "[PATCH] Heap buffer overflow in tokenadd() (fix #105) This was an off-by one: the NUL terminator byte was not allocated on resize. This was triggered by JSON-encoded numbers longer than 256 bytes. src/jv_parse.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)",
"patch_text_b64... | n/a | |
GHSA-w4rh-fgx7-q63m | ray vulnerable to Insertion of Sensitive Information into Log File | null | [
{
"commit_message": "[PATCH] [core] Redact redis password in log (#50409) <!-- Thank you for your contribution! Please review https://github.com/ray-project/ray/blob/master/CONTRIBUTING.rst before opening a pull request. --> <!-- Please add a reviewer to the assignee section when you create a PR. If you don't h... | null |
GHSA-vr7m-r9vm-m4wf | PrestaShop XSS can be stored in DB from "add a message form" in order detail page (FO) | null | [
{
"commit_message": "[PATCH] add validation method in customer message object model classes/CustomerMessage.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSBhZmM0NWI5M2IzY2MzM2JlMGU1NzE1NTlkMjgzOGM2OTYwZDk4ODU2IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBNYXR0aGlldSBSb2xsYW... | null |
CVE-2022-1021 | Insecure Storage of Sensitive Information in chatwoot/chatwoot | Insecure Storage of Sensitive Information in GitHub repository chatwoot/chatwoot prior to 2.6.0. | [
{
"commit_message": "[PATCH] fix: Referer URL validation (#4309) Fixes #354 .rubocop.yml | 1 + app/models/campaign.rb | 11 +---------- app/models/conversation.rb | 8 ++++++++ lib/url_helper.rb | 11 +++++++++++ spec/helpers/url_helper_spec.rb | 15 +++++++++++... | CWE-922 Insecure Storage of Sensitive Information |
GHSA-jjmg-x456-w976 | Incorrect default cookie name and recommendation | null | [
{
"commit_message": "[PATCH] fix: update default cookie name The default cookie name and README recommendation was incorrect. The recommended prefix is not \"Host__\", but \"__Host-\". A minor security advisory will be released for this issue. It isn't a huge vulnerability as there are workarounds available, e.... | null |
CVE-2026-22788 | WebErpMesv2 allows unauthenticated API Access | WebErpMesv2 is a Resource Management and Manufacturing execution system Web for industry. Prior to 1.19, the WebErpMesV2 application exposes multiple sensitive API endpoints without authentication middleware. An unauthenticated remote attacker can read business-critical data including companies, quotes, orders, tasks, and whiteboards. Limited write access allows creation of company records and full manipulation of collaboration whiteboards. This vulnerability is fixed in 1.19. | [
{
"commit_message": "[PATCH] Fix GHSA-pp68-5pc2-hv7w app/Http/Kernel.php | 1 + 1 file changed, 1 insertion(+)",
"patch_text_b64": "RnJvbSAzYTdhYjFjOTVkMWQxYzhmN2M2MmM4NGJjODdiMzY2NmVjZDJmYTIzIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBiaWxseWJveTM1IDxrZXZpbi5uaWdsYXV0QHdhbmFkb28uZnI+CkRhdGU6IE1vbiwgMTIgSmFuI... | CWE-306: Missing Authentication for Critical Function |
GHSA-77r7-v55r-g5r7 | null | [
{
"commit_message": "[PATCH] KEYS: fix keyctl_set_reqkey_keyring() to not leak thread keyrings This fixes CVE-2017-7472. Running the following program as an unprivileged user exhausts kernel memory by leaking thread keyrings: #include <keyutils.h> int main() { for (;;) keyctl_set_reqkey_keyring(KEY_REQKEY_DEFL_... | null | |
CVE-2022-4859 | Joget User Profile Menu UserProfileMenu.java submitForm cross site scripting | A vulnerability, which was classified as problematic, has been found in Joget up to 7.0.33. This issue affects the function submitForm of the file wflow-core/src/main/java/org/joget/plugin/enterprise/UserProfileMenu.java of the component User Profile Menu. The manipulation of the argument firstName/lastName leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 7.0.34 is able to address this issue. The patch is named 9a77f508a2bf8cf661d588f37a4cc29ecaea4fc8. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217055. | [
{
"commit_message": "[PATCH] Fixed: wflow-core - User Profile Menu - Prevent XSS. T1604 @7.0-SNAPSHOT .../java/org/joget/plugin/enterprise/UserProfileMenu.java | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-)",
"patch_text_b64": "RnJvbSA5YTc3ZjUwOGEyYmY4Y2Y2NjFkNTg4ZjM3YTRjYzI5ZWNhZWE0ZmM4IE1vbi... | CWE-79 Cross Site Scripting |
GHSA-c4fr-gx5w-8qf2 | Jenkins Subversion Plugin Stores Credentials with Base64 Encoding | null | [
{
"commit_message": "[PATCH] [FIXED SECURITY-58] encryption of passphrases wasn't sufficiently secure. src/main/java/hudson/scm/SubversionSCM.java | 24 ++++++++++++--------- 1 file changed, 14 insertions(+), 10 deletions(-)",
"patch_text_b64": "RnJvbSA3ZDQ1NjJkNmY3ZTQwZGUwNGJiZTI5NTc3YjUxYzc5ZjA3ZDA1YmE2IE1... | null |
CVE-2025-59941 | go-f3 is Vulnerable to Cached Justification Verification Bypass | go-f3 is a Golang implementation of Fast Finality for Filecoin (F3). In versions 0.8.8 and below, go-f3's justification verification caching mechanism has a vulnerability where verification results are cached without properly considering the context of the message. An attacker can bypass justification verification by submitting a valid message with a correct justification and then reusing the same cached justification in contexts where it would normally be invalid. This occurs because the cached verification does not properly validate the relationship between the justification and the specific message context it's being used with. This issue is fixed in version 0.8.9. | [
{
"commit_message": "[PATCH] tests: fix assertions in emulator (#1043) This PR fixes assertions checks in emulator and re-organises the validation logic a bit to facilitate testing. Signed-off-by: Jakub Sztandera <oss@kubuxu.com> emulator/driver_assertions.go | 25 ++++--- gpbft/gpbft_test.go | 17 ++... | CWE-305: Authentication Bypass by Primary Weakness |
GHSA-jm34-xm8m-w958 | Open Redirect in oauth2_proxy | null | [
{
"commit_message": "[PATCH] add check for //.* to prevent open redirect during oauth oauthproxy.go | 2 +- providers/provider_default.go | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSAyODlhNmNjZjQ2M2E0MjVjNzYwNjE3OGM1MTBmYzVlZWI5YzhiMDUwIE1vbiBTZXAgMTcgMD... | null |
GHSA-63wp-w3mg-whpq | null | [
{
"commit_message": "[PATCH] Add CVE for buffer overflow security fix NEWS | 1 + 1 file changed, 1 insertion(+)",
"patch_text_b64": "RnJvbSBlNzg3OWUyN2EzNzExOWZhZDRmYWYxMzNhOWY3MGJkY2RjNzVkNzYwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBSdXNzIEFsbGJlcnkgPHJyYUBkZWJpYW4ub3JnPgpEYXRlOiBTdW4sIDIyIE1hciAyMDIwIDI... | null | |
CVE-2012-2384 | Integer overflow in the i915_gem_do_execbuffer function in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.3.5 on 32-bit platforms allows local users to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted ioctl call. | [
{
"commit_message": "[PATCH] drm/i915: fix integer overflow in i915_gem_do_execbuffer() On 32-bit systems, a large args->num_cliprects from userspace via ioctl may overflow the allocation size, leading to out-of-bounds access. This vulnerability was introduced in commit 432e58ed (\"drm/i915: Avoid allocation fo... | n/a | |
CVE-2022-35173 | An issue was discovered in Nginx NJS v0.7.5. The JUMP offset for a break instruction was not set to a correct offset during code generation, leading to a segmentation violation. | [
{
"commit_message": "[PATCH] Fixed break instruction in a try-catch block. Previously, JUMP offset for a break instruction inside a try-catch block was not set to a correct offset during code generation when a return instruction was present in inner try-catch block. The fix is to update the JUMP offset appropri... | n/a | |
CVE-2023-51698 | Atril's CBT comic book parsing vulnerable to Remote Code Execution | Atril is a simple multi-page document viewer. Atril is vulnerable to a critical Command Injection Vulnerability. This vulnerability gives the attacker immediate access to the target system when the target user opens a crafted document or clicks on a crafted link/URL using a maliciously crafted CBT document which is a TAR archive. A patch is available at commit ce41df6. | [
{
"commit_message": "[PATCH] comics: Use libarchive to unpack documents This commit eliminates the use of external commands for opening comic documents, and uses libarchive instead. backend/comics/Makefile.am | 5 +- backend/comics/comics-document.c | 1143 +++++++++++------------------- backend/comics/c... | CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') |
CVE-2024-43783 | Apollo Router Coprocessors may cause Denial-of-Service when handling request bodies | The Apollo Router Core is a configurable, high-performance graph router written in Rust to run a federated supergraph that uses Apollo Federation 2. Instances of the Apollo Router running versions >=1.21.0 and < 1.52.1 are impacted by a denial of service vulnerability if _all_ of the following are true: 1. The Apollo Router has been configured to support [External Coprocessing](https://www.apollographql.com/docs/router/customizations/coprocessor). 2. The Apollo Router has been configured to send request bodies to coprocessors. This is a non-default configuration and must be configured intentionally by administrators. Instances of the Apollo Router running versions >=1.7.0 and <1.52.1 are impacted by a denial-of-service vulnerability if all of the following are true: 1. Router has been configured to use a custom-developed Native Rust Plugin. 2. The plugin accesses Request.router_request in the RouterService layer. 3. You are accumulating the body from Request.router_request into memory. If using an impacted configuration, the Router will load entire HTTP request bodies into memory without respect to other HTTP request size-limiting configurations like limits.http_max_request_bytes. This can cause the Router to be out-of-memory (OOM) terminated if a sufficiently large request is sent to the Router. By default, the Router sets limits.http_max_request_bytes to 2 MB. If you have an impacted configuration as defined above, please upgrade to at least Apollo Router 1.52.1. If you cannot upgrade, you can mitigate the denial-of-service opportunity impacting External Coprocessors by setting the coprocessor.router.request.body configuration option to false. Please note that changing this configuration option will change the information sent to any coprocessors you have configured and may impact functionality implemented by those coprocessors. If you have developed a Native Rust Plugin and cannot upgrade, you can update your plugin to either not accumulate the request body or enforce a maximum body size limit. You can also mitigate this issue by limiting HTTP body payload sizes prior to the Router (e.g., in a proxy or web application firewall appliance). | [
{
"commit_message": "[PATCH] fix(security): CVE-2024-43783: Enforce body limits early in request pipeline This fixes a weakness (classified as [CWE-770]) which made it possible to exceed the configured request payload maximums set with the [`limits.http_max_request_bytes`] configuration option when used in conj... | CWE-770: Allocation of Resources Without Limits or Throttling |
GHSA-j7gq-x7p9-9cgf | null | [
{
"commit_message": "[PATCH] fix: Fixed command execution for site admins - a server setting allowing the override of the path variable for esoteric RHEL systems allowed site admins to inject arbitrary commands - impact was limited by the setting being only accessible to the site administrator - as reported by ... | null | |
CVE-2022-2820 | Session Fixation in namelessmc/nameless | Session Fixation in GitHub repository namelessmc/nameless prior to v2.0.2.
| [
{
"commit_message": "[PATCH] Rework user sessions system (#3000) Co-authored-by: samerton <samerton@users.noreply.github.com> core/classes/Core/User.php | 66 ++++++++++++------- core/init.php | 6 +- .../installation/includes/upgrade_perform.php | 37 ----------... | CWE-384 Session Fixation |
CVE-2016-2847 | fs/pipe.c in the Linux kernel before 4.5 does not limit the amount of unread data in pipes, which allows local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes. | [
{
"commit_message": "[PATCH] pipe: limit the per-user amount of pages allocated in pipes On no-so-small systems, it is possible for a single process to cause an OOM condition by filling large pipes with data that are never read. A typical process filling 4000 pipes with 1 MB of data will use 4 GB of memory. On ... | n/a |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.