id stringlengths 12 19 | title stringlengths 0 237 | description stringlengths 35 3.87k ⌀ | patches listlengths 1 22 | cwe stringlengths 2 440 ⌀ |
|---|---|---|---|---|
GHSA-2rwh-262r-r85j | Dolibarr ERP and CRM malicious executable loading | null | [
{
"commit_message": "[PATCH] FIX CVE-2019-11200 htdocs/admin/tools/dolibarr_export.php | 2 +- htdocs/admin/tools/export.php | 3 +- htdocs/core/class/utils.class.php | 38 ++++++++++++++------------ 3 files changed, 23 insertions(+), 20 deletions(-)",
"patch_text_b64": "RnJvbSAwMTA3NTA4MWNiY2Q... | null |
GHSA-chq7-m4fp-95ff | null | [
{
"commit_message": "[PATCH] Clean up DB code, remove some SQL injection holes. .../java/org/identifiers/db/DbUtilities.java | 7 +- .../java/org/identifiers/db/RegistryDao.java | 140 ++++++++---------- 2 files changed, 59 insertions(+), 88 deletions(-)",
"patch_text_b64": "RnJvbSA0NGJiMGRiOTFjMDY0ZTMwNW... | null | |
CVE-2021-37680 | Division by zero in TFLite in TensorFlow | TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation of fully connected layers in TFLite is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/lite/kernels/fully_connected.cc#L226). We have patched the issue in GitHub commit 718721986aa137691ee23f03638867151f74935f. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. | [
{
"commit_message": "[PATCH] Prevent division by 0 in `fully_connected.cc` PiperOrigin-RevId: 385137282 Change-Id: If201e69b6e0048f0be001330b4b977e2b46db2cb tensorflow/lite/kernels/fully_connected.cc | 1 + 1 file changed, 1 insertion(+)",
"patch_text_b64": "RnJvbSA3MTg3MjE5ODZhYTEzNzY5MWVlMjNmMDM2Mzg4NjcxNT... | CWE-369: Divide By Zero |
CVE-2016-3728 | Eval injection vulnerability in tftp_api.rb in the TFTP module in the Smart-Proxy in Foreman before 1.10.4 and 1.11.x before 1.11.2 allows remote attackers to execute arbitrary code via the PXE template type portion of the PATH_INFO to tftp/. | [
{
"commit_message": "[PATCH] Fixes #14931 - TFTP class instantiating fixed modules/tftp/tftp_api.rb | 5 +++-- test/tftp/tftp_api_test.rb | 11 +++++++++++ 2 files changed, 14 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSBlZWY1MzJhYTY2OGQ2NTZiOWQ2MWQ5YzZlZGY3YzI1MDVmM2Y0M2M3IE1vbiBTZXAgMTcgMDA6... | n/a | |
CVE-2019-11599 | The coredump implementation in the Linux kernel before 5.0.10 does not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allows local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c. | [
{
"commit_message": "[PATCH] coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping The core dumping code has always run without holding the mmap_sem for writing, despite that is the only way to ensure that the entire vma layout will not change from under it. Only using some signa... | n/a | |
GHSA-7pjr-2rgh-fc5g | Anonymous PrestaShop customer can download other customers' invoices | null | [
{
"commit_message": "[PATCH] fix pdf invoice security conditions controllers/front/PdfInvoiceController.php | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSA0NmI5YTJiNDMwZGQyMDA4YWMwNjFmYmNiYWU5ZjdhZjU1YTc5MjBhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBNYXR0aGlldSBSb2xsY... | null |
GHSA-44cw-p2hm-gpf6 | Disabled Hostname Verification in Opencast | null | [
{
"commit_message": "[PATCH] Re-Enable Hostname Verification This patch is a minimal change to re-enable HTTPS hostname verification of Opencast's HTTP client used for a large portion its HTTP requests. Hostname verification is an important part when using HTTPS to ensure that the presented certificate is valid... | null |
GHSA-4f5x-q4jc-xfcf | Cross-site Scripting in pimcore | null | [
{
"commit_message": "[PATCH] [Thumbnail] Validate media query name bundles/AdminBundle/Controller/Admin/SettingsController.php | 5 +++++ .../Resources/public/js/pimcore/settings/thumbnail/item.js | 4 ++++ 2 files changed, 9 insertions(+)",
"patch_text_b64": "RnJvbSA2ZjM2ZTg0MWNlNTVmNjdlMmU5NTI1M2RkNThmOD... | null |
CVE-2022-22117 | Directus - Stored Cross-Site Scripting (XSS) in Profile Avatar Image | In Directus, versions 9.0.0-alpha.4 through 9.4.1 allow unrestricted file upload of .html files in the media upload functionality, which leads to Cross-Site Scripting vulnerability. A low privileged attacker can upload a crafted HTML file as a profile avatar, and when an admin or another user opens it, the XSS payload gets triggered. | [
{
"commit_message": "[PATCH] Add Content-Security-Policy header by default (#10776) api/package.json | 1 + api/src/app.ts | 4 ++++ docs/configuration/config-options.md | 29 ++++++++++++++-------------- package-lock.json | 15 ++++++++++++++ 4 files c... | CWE-79 Cross-site Scripting (XSS) |
GHSA-fcqf-hhgj-p27f | null | [
{
"commit_message": "[PATCH] fix(nuxt): validate no `//` in path when constructing payload url (#19085) packages/nuxt/src/app/composables/payload.ts | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-)",
"patch_text_b64": "RnJvbSA3YWEzNWZmOTU4ZWVjMGM3ZDA3MWQzZmNkNDgxZGI1NzI4MWRiY2Q5IE1vbiBTZXAgMTcgM... | null | |
CVE-2021-31294 | Redis before 6cbea7d allows a replica to cause an assertion failure in a primary server by sending a non-administrative command (specifically, a SET command). NOTE: this was fixed for Redis 6.2.x and 7.x in 2021. Versions before 6.2 were not intended to have safety guarantees related to this. | [
{
"commit_message": "[PATCH] Prevent replicas from sending commands that interact with keyspace (#8868) This solves an issue reported in #8712 in which a replica would bypass the client write pause check and cause an assertion due to executing a write command during failover. The fact is that we don't expect re... | n/a | |
CVE-2018-11592 | Espruino before 1.98 allows attackers to cause a denial of service (application crash) with a user crafted input file via an Out-of-bounds Read during syntax parsing in which certain height validation is missing in libs/graphics/jswrap_graphics.c. | [
{
"commit_message": "[PATCH] Add height check for Graphics.createArrayBuffer(...vertical_byte:true) (fix #1421) ChangeLog | 1 + libs/graphics/jswrap_graphics.c | 10 ++++++++-- libs/graphics/lcd_arraybuffer.c | 1 + 3 files changed, 10 insertions(+), 2 deletions(-)",
"patch_text_b64": ... | n/a | |
GHSA-4wxw-42wx-2wfx | Apache Solr Schema Designer blindly "trusts" all configsets | null | [
{
"commit_message": "[PATCH] SOLR-16777: Schema Designer now correctly manages trust of the ConfigSets it is managing Co-authored-by: Houston Putman <houston@apache.org> solr/CHANGES.txt | 2 + .../solr/handler/admin/ConfigSetsHandler.java | 31 +++++++++++++++- .../handler/designer/... | null |
GHSA-rr59-h6rh-v84v | Apache Zeppelin SAP: connecting to a malicious SAP server allowed it to perform XXE | null | [
{
"commit_message": "[PATCH] rework xml factory (#4302) .../zeppelin/sap/universe/UniverseClient.java | 44 +++++++++++++++---- 1 file changed, 36 insertions(+), 8 deletions(-)",
"patch_text_b64": "RnJvbSBiZWE1MWQxNDY3ZDYxMDNiZDhmZDY4ZDZhMjdiMTRmOTU0ZDk4ZWM2IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBQSiBGYW5... | null |
CVE-2015-10023 | Fumon trello-octometric srv.go main sql injection | A vulnerability classified as critical has been found in Fumon trello-octometric. This affects the function main of the file metrics-ui/server/srv.go. The manipulation of the argument num leads to sql injection. The patch is named a1f1754933fbf21e2221fbc671c81a47de6a04ef. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217611. | [
{
"commit_message": "[PATCH] Fixed sql injection metrics-ui/server/srv.go | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-)",
"patch_text_b64": "RnJvbSBhMWYxNzU0OTMzZmJmMjFlMjIyMWZiYzY3MWM4MWE0N2RlNmEwNGVmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBKYWRlIEJpbGtleSA8aGVyc2VsZkB0aGVmdW1vbi5jb20+CkRh... | CWE-89 SQL Injection |
CVE-2013-2929 | The Linux kernel before 3.12.2 does not properly use the get_dumpable function, which allows local users to bypass intended ptrace restrictions or obtain sensitive information from IA64 scratch registers via a crafted application, related to kernel/ptrace.c and arch/ia64/include/asm/processor.h. | [
{
"commit_message": "[PATCH] exec/ptrace: fix get_dumpable() incorrect tests The get_dumpable() return value is not boolean. Most users of the function actually want to be testing for non-SUID_DUMP_USER(1) rather than SUID_DUMP_DISABLE(0). The SUID_DUMP_ROOT(2) is also considered a protected state. Almost al... | n/a | |
CVE-2018-20726 | A cross-site scripting (XSS) vulnerability exists in host.php (via tree.php) in Cacti before 1.2.0 due to lack of escaping of unintended characters in the Website Hostname field for Devices. | [
{
"commit_message": "[PATCH] Resolving Issues #2213, #2214, #2215 and Additional Multiple XSS vectors associated with un-escaped strings. Introduce new function, audit all calls, remove inline styles for classes, some i18n missed. CHANGELOG | 3 +++ aggregate_graphs.php | 6 +++--- aggrega... | n/a | |
GHSA-p6wp-9xww-w5v7 | null | [
{
"commit_message": "[PATCH] Regenerate session after XING login to fix \"session fixation\" vulnerability app/controllers/oauth.js | 96 +++++++++++++++++++++------------------- 1 file changed, 51 insertions(+), 45 deletions(-)",
"patch_text_b64": "RnJvbSBlOWYwZDUwOWUxNDA4NzQzMDQ4ZTI5ZDljMDk5ZDM2ZTBlMWY2YWU... | null | |
CVE-2017-16359 | In radare 2.0.1, a pointer wraparound vulnerability exists in store_versioninfo_gnu_verdef() in libr/bin/format/elf/elf.c. | [
{
"commit_message": "[PATCH] Fix #8764 - huge vd_aux caused pointer wraparound libr/bin/format/elf/elf.c | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-)",
"patch_text_b64": "RnJvbSA2MmUzOWYzNGIyNzA1MTMxYTJkMDhhZmYwYzJlNTQyYzZhNTJjZjBlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBLaGFpcnVsIEthc21pc... | n/a | |
GHSA-m6q9-p373-g5q8 | Keycloak's unvalidated cross-origin messages in checkLoginIframe leads to DDoS | null | [
{
"commit_message": "[PATCH] Limit requests sent through session status iframe (#132) Closes #116 Signed-off-by: Jon Koops <jonkoops@gmail.com> .../protocol/oidc/endpoints/login-status-iframe.html | 8 ++++++++ 1 file changed, 8 insertions(+)",
"patch_text_b64": "RnJvbSA5ZDk4MTdlMTVhMDcxOTVmMTZmNTU0Yjdm... | null |
GHSA-65wv-x94h-86g5 | null | [
{
"commit_message": "[PATCH] avcodec/utils: correct align value for interplay Fixes out of array access Fixes: 452/fuzz-1-ffmpeg_VIDEO_AV_CODEC_ID_INTERPLAY_VIDEO_fuzzer Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg Signed-off-by: Michael Niedermayer <michael... | null | |
GHSA-pw27-w7w4-9qc7 | Django XSS Vulnerability | null | [
{
"commit_message": "[PATCH] [1.8.x] Fixed CVE-2016-2512 -- Prevented spoofing is_safe_url() with basic auth. This is a security fix. django/utils/http.py | 8 ++++++-- docs/releases/1.8.10.txt | 16 ++++++++++++++++ tests/utils_tests/test_http.py | 12 ++++++++++++ 3 files changed, 34 insertions(... | null |
CVE-2023-23939 | Azure/setup-kubectl: Escalation of privilege vulnerability for v3 and lower | Azure/setup-kubectl is a GitHub Action for installing Kubectl. This vulnerability only impacts versions before version 3. An insecure temporary creation of a file allows other actors on the Actions runner to replace the Kubectl binary created by this action because it is world writable. This Kubectl tool installer runs `fs.chmodSync(kubectlPath, 777)` to set permissions on the Kubectl binary, however, this allows any local user to replace the Kubectl binary. This allows privilege escalation to the user that can also run kubectl, most likely root. This attack is only possible if an attacker somehow breached the GitHub actions runner or if a user is utilizing an Action that maliciously executes this attack. This has been fixed and released in all versions `v3` and later. 775 permissions are used instead. Users are advised to upgrade. There are no known workarounds for this issue.
| [
{
"commit_message": "[PATCH] lower permissions for chmod (#51) src/run.test.ts | 4 ++-- src/run.ts | 2 +- 2 files changed, 3 insertions(+), 3 deletions(-)",
"patch_text_b64": "RnJvbSBkNDQ5ZDc1NDk1ZDJiOWQxNDYzNTU1YmIwMGNhM2RjYTc3YTQyYWI2IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBPbGl2ZXIgS2luZyA8b2xpdmV... | CWE-732: Incorrect Permission Assignment for Critical Resource |
CVE-2025-58447 | rAthena has heap-based buffer overflow in login server | rAthena is an open-source cross-platform massively multiplayer online role playing game (MMORPG) server. Versions prior to commit 2f5248b have a heap-based buffer overflow in the login server, remote attacker to overwrite adjacent session fields by sending a crafted `CA_SSO_LOGIN_REQ` with an oversized token length. This leads to immediate denial of service (crash) and it is possible to achieve remote code execution via heap corruption. Commit 2f5248b fixes the issue. | [
{
"commit_message": "[PATCH] Fixed a heap-based buffer overflow Thanks to @RamadhanAmizudin src/login/loginclif.cpp | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSAyZjUyNDhiOWNkOWE4YzZiNDI0MjJkZGVjZmM0Y2MyY2QwZTY5ZTRiIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBMZW1vbmdyYXNzMz... | CWE-122: Heap-based Buffer Overflow |
GHSA-8rv8-6h34-r855 | null | [
{
"commit_message": "[PATCH] https://github.com/ImageMagick/ImageMagick/issues/1615 MagickCore/statistic.c | 13 ++++++------- 1 file changed, 6 insertions(+), 7 deletions(-)",
"patch_text_b64": "RnJvbSAwMjVlNzdmY2IyZjQ1YjIxNjg5OTMxYmEzYmY3NGVhYzE1M2FmYTQ4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBDcmlzdHkgP... | null | |
GHSA-wrp6-2w63-vpc4 | null | [
{
"commit_message": "[PATCH] NLS: improve UTF8 -> UTF16 string conversion routine The utf8s_to_utf16s conversion routine needs to be improved. Unlike its utf16s_to_utf8s sibling, it doesn't accept arguments specifying the maximum length of the output buffer or the endianness of its 16-bit output. This patch (a... | null | |
CVE-2021-44421 | The pointer-validation logic in util/mem_util.rs in Occlum before 0.26.0 for Intel SGX acts as a confused deputy that allows a local attacker to access unauthorized information via side-channel analysis. | [
{
"commit_message": "[PATCH] Check the buffer address before copy the data from the buffer This commit fixed an Occlum security issue. The researchers from KU Leuven (Belgium) and the University of Birmingham (UK) found it and reported it to Occlum team. Thank you, Jo Van Bulck, Frank Piessens, Fritz Alder, Dav... | n/a | |
GHSA-6q4j-8pjm-5mgc | SEOmatic for CraftCMS allows Server-Side Template Injection | null | [
{
"commit_message": "[PATCH] Version 3.3.0 CHANGELOG.md | 3 +++ 1 file changed, 3 insertions(+)",
"patch_text_b64": "RnJvbSA2NWFiNjU5Y2I2YzkxNGM3YWQ2NzFhZjFlNDE3YzBkYTI0MzFmNzliIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBbmRyZXcgV2VsY2ggPGFuZHJld0BrZWx1bGkubG9jYWw+CkRhdGU6IE1vbiwgMjcgQXByIDIwMjAgMTk6MjU6MTI... | null |
CVE-2014-7145 | The SMB2_tcon function in fs/cifs/smb2pdu.c in the Linux kernel before 3.16.3 allows remote CIFS servers to cause a denial of service (NULL pointer dereference and client system crash) or possibly have unspecified other impact by deleting the IPC$ share during resolution of DFS referrals. | [
{
"commit_message": "[PATCH] [CIFS] Possible null ptr deref in SMB2_tcon As Raphael Geissert pointed out, tcon_error_exit can dereference tcon and there is one path in which tcon can be null. Signed-off-by: Steve French <smfrench@gmail.com> CC: Stable <stable@vger.kernel.org> # v3.7+ Reported-by: Raphael Geisse... | n/a | |
GHSA-64r9-x74q-wxmh | Stored XSS vulnerability in Jenkins Pipeline: Supporting APIs Plugin | null | [
{
"commit_message": "[PATCH] [SECURITY-2881] .gitignore | 4 +- .../steps/input/POSTHyperlinkNote.java | 20 ++- .../steps/input/POSTHyperlinkNoteTest.java | 155 ++++++++++++++++++ 3 files changed, 177 insertions(+), 2 deletions(-) create mode 100644 src/test/java/o... | null |
CVE-2019-6706 | Lua 5.3.5 has a use-after-free in lua_upvaluejoin in lapi.c. For example, a crash outcome might be achieved by an attacker who is able to trigger a debug.upvaluejoin call in which the arguments have certain relationships. | [
{
"commit_message": "[PATCH] Fixed bug in 'lua_upvaluejoin' Bug-fix: joining an upvalue with itself could cause a use-after-free crash. bugs | 64 +++++++++++++++++++++++++++++--------------------------- lapi.c | 12 +++++------ makefile | 4 ++-- 3 files changed, 41 insertions(+), 39 deletions(-)",
"pa... | n/a | |
PYSEC-2021-227 | null | [
{
"commit_message": "[PATCH] Prevent a null pointer exception in TFLite PiperOrigin-RevId: 370800206 Change-Id: Idd437ebce4ff224120d8eefc1c14c062173b71d6 tensorflow/lite/kernels/maximum_minimum.cc | 60 +++++++++++----------- 1 file changed, 31 insertions(+), 29 deletions(-)",
"patch_text_b64": "RnJvbSA5NTNm... | null | |
GHSA-6qg7-x2gx-6jfr | null | [
{
"commit_message": "[PATCH] Issue #718: Fix TALOS-CAN-152 If a 7-Zip archive declares a rediculously large number of substreams, it can overflow an internal counter, leading a subsequent memory allocation to be too small for the substream data. Thanks to the Open Source and Threat Intelligence project at Cisco... | null | |
GHSA-78vg-7v27-hj67 | auditor-bundle vulnerable to Cross-site Scripting because name of entity does not get escaped | null | [
{
"commit_message": "[PATCH] Merge commit from fork src/Resources/views/Audit/helpers/helper.html.twig | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-)",
"patch_text_b64": "RnJvbSA0MmJhMjk0MGQ4Yjk5NDY3ZGUwYzgwNmVhNTY1NWNjMWM2ODgyY2QxIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBGYWJpYW4gS3JvcG... | null |
CVE-2021-45939 | wolfSSL wolfMQTT 1.9 has a heap-based buffer overflow in MqttClient_DecodePacket (called from MqttClient_WaitType and MqttClient_Subscribe). | [
{
"commit_message": "[PATCH] Fix wolfmqtt-fuzzer: Null-dereference WRITE in MqttProps_Free src/mqtt_client.c | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSA4NGQ0YjUzMTIyZTBmYTAyODBjNzg3MjM1MGI4OWQ1Nzc3ZGFiYmIyIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBFcmljIEJsYW5rZW5o... | n/a | |
CVE-2025-55152 | oak: ReDoS in x-forwarded-proto and x-forwarded-for headers | oak is a middleware framework for Deno's native HTTP server, Deno Deploy, Node.js 16.5 and later, Cloudflare Workers and Bun. In versions 17.1.5 and below, it's possible to significantly slow down an oak server with specially crafted values of the x-forwarded-proto or x-forwarded-for headers. | [
{
"commit_message": "[PATCH] fix: address ReDoS vulnerability in headers (#700) Co-authored-by: Cursor Agent <cursoragent@cursor.com> request.test.ts | 79 +++++++++++++++++++++++++++++++++++++++++++++++++ request.ts | 24 +++++++++++---- 2 files changed, 98 insertions(+), 5 deletions(-)",
"patch_text_b6... | CWE-400: Uncontrolled Resource Consumption |
GHSA-x2xx-jw5m-5j86 | LIEF contains segmentation violation | null | [
{
"commit_message": "[PATCH] Resolve #764 src/MachO/Binary.cpp | 12 ++++++++---- 1 file changed, 8 insertions(+), 4 deletions(-)",
"patch_text_b64": "RnJvbSA3YWNmMGJjNDIyNDA4MWQ0ZjQyNWZjYzhiMmUzNjFiOTUyOTFkODc4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBSb21haW4gVGhvbWFzIDxtZUByb21haW50aG9tYXMuZnI+CkRhdGU6IF... | null |
CVE-2019-25049 | LibreSSL 2.9.1 through 3.2.1 has an out-of-bounds read in asn1_item_print_ctx (called from asn1_template_print_ctx). | [
{
"commit_message": "[PATCH] Make pthread_mutex static initialisation work on Windows. This takes the dynamic initialisation code added to CRYPTO_lock() in e5081719 and applies it to the Window's pthread_mutex implementation. This allows for PTHREAD_MUTEX_INITIALIZER to be used on Windows. bcook has agreed to p... | n/a | |
GHSA-pjv9-3c8f-mr4h | null | [
{
"commit_message": "[PATCH] Fix #7152 - Null deref in cms libr/util/r_pkcs7.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSA3YWI2NmNjYTViYmRmNmNiMmQ2OTMzOWVmNGY1MTNkOTVlNTMyZGJmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBHaW92YW5uaSA8d2FyZ2lvQGxpYmVyby5pdD4KRGF0ZTogTW9u... | null | |
GHSA-9g8m-v378-pcg3 | parse is vulnerable to prototype pollution | null | [
{
"commit_message": "[PATCH] fix: Prototype Pollution vulnerability in `SingleInstanceStateController`; fixes security vulnerability [GHSA-9g8m-v378-pcg3](https://github.com/advisories/GHSA-9g8m-v378-pcg3) (#2745) src/SingleInstanceStateController.ts | 40 ++++++-- .../SingleInstanceStateController-tes... | null |
CVE-2021-37660 | Division by 0 in inplace operations in TensorFlow | TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can cause a floating point exception by calling inplace operations with crafted arguments that would result in a division by 0. The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/kernels/inplace_ops.cc#L283) has a logic error: it should skip processing if `x` and `v` are empty but the code uses `||` instead of `&&`. We have patched the issue in GitHub commit e86605c0a336c088b638da02135ea6f9f6753618. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. | [
{
"commit_message": "[PATCH] Fix FPE in inpace update ops. PiperOrigin-RevId: 388303197 Change-Id: Ib48309b6213ffe53eba81004b00e889d653e4b83 tensorflow/core/kernels/inplace_ops.cc | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSBlODY2MDVjMGEzMzZjMDg4YjYzOGRhMDIxMzVlYTZmOWY2Nz... | CWE-369: Divide By Zero |
GHSA-94qv-77gg-mfm4 | null | [
{
"commit_message": "[PATCH] ALSA: compress: fix an integer overflow check I previously added an integer overflow check here but looking at it now, it's still buggy. The bug happens in snd_compr_allocate_buffer(). We multiply \".fragments\" and \".fragment_size\" and that doesn't overflow but then we save it i... | null | |
CVE-2025-30168 | Parse Server has an OAuth login vulnerability | Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 7.5.2 and 8.0.2, the 3rd party authentication handling of Parse Server allows the authentication credentials of some specific authentication providers to be used across multiple Parse Server apps. For example, if a user signed up using the same authentication provider in two unrelated Parse Server apps, the credentials stored by one app can be used to authenticate the same user in the other app. Note that this only affects Parse Server apps that specifically use an affected 3rd party authentication provider for user authentication, for example by setting the Parse Server option auth to configure a Parse Server authentication adapter. The fix of this vulnerability requires to upgrade Parse Server to a version that includes the bug fix, as well as upgrade the client app to send a secure payload, which is different from the previous insecure payload. This vulnerability is fixed in 7.5.2 and 8.0.2. | [
{
"commit_message": "[PATCH] fix: Authentication provider credentials are usable across Parse Server apps; fixes security vulnerability [GHSA-837q-jhwx-cmpv](https://github.com/parse-community/parse-server/security/advisories/GHSA-837q-jhwx-cmpv) (#9668) spec/.eslintrc.json | 1 + spe... | CWE-287: Improper Authentication |
GHSA-953g-4rmq-23v8 | null | [
{
"commit_message": "[PATCH] Enable per-workspace provider/model combination (#1042) * Enable per-workspace provider/model combination * cleanup * remove resetWorkspaceChatModels and wipeWorkspaceModelPreference to prevent workspace from resetting model * add space Co-authored-by: shatfield4 <seanhatfield5@gmai... | null | |
CVE-2024-54679 | CyberPanel (aka Cyber Panel) before 6778ad1 does not require the FilemanagerAdmin capability for restartMySQL actions. | [
{
"commit_message": "[PATCH] restart mysql databases/views.py | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSA2Nzc4YWQxZWFhZTQxZjcyMzY1ZGE4ZmQwMjFmOWE2MDM2OTYwMGRjIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiB1c21hbm5hc2lyIDx1c21hbkBjeWJlcnBlcnNvbnMuY29tPgpEYXRlOiBUdWUsIDEyIE... | n/a | |
CVE-2022-0669 | A flaw was found in dpdk. This flaw allows a malicious vhost-user master to attach an unexpected number of fds as ancillary data to VHOST_USER_GET_INFLIGHT_FD / VHOST_USER_SET_INFLIGHT_FD messages that are not closed by the vhost-user slave. By sending such messages continuously, the vhost-user master exhausts available fd in the vhost-user slave process, leading to a denial of service. | [
{
"commit_message": "[PATCH] vhost: fix FD leak with inflight messages Even if unlikely, a buggy vhost-user master might attach fds to inflight messages. Add checks like for other types of vhost-user messages. Fixes: d87f1a1cb7b6 (\"vhost: support inflight info sharing\") Cc: stable@dpdk.org Signed-off-by: Davi... | CWE-400 - Uncontrolled Resource Consumption. | |
CVE-2023-29506 | org.xwiki.platform:xwiki-platform-security-authentication-default XSS with authenticated endpoints | XWiki Commons are technical libraries common to several other top level XWiki projects. It was possible to inject some code using the URL of authenticated endpoints. This problem has been patched on XWiki 13.10.11, 14.4.7 and 14.10. | [
{
"commit_message": "[PATCH] XWIKI-20335: Wiki existence is not properly checked in authenticate ...uthenticationResourceReferenceHandler.java | 16 +++++++ ...nticationResourceReferenceHandlerTest.java | 43 +++++++++++++++++-- 2 files changed, 55 insertions(+), 4 deletions(-)",
"patch_text_b64": "RnJvbSAxOT... | CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
GHSA-cpx4-fhhq-52jh | null | [
{
"commit_message": "[PATCH] Don't allow unhandled POSTs to write to the filesystem by default If there's no registered handler for a POST request, the default behaviour is to write it to the filesystem. Several million deployed devices appear to have this behaviour, making it possible to (at least) store arbit... | null | |
PYSEC-2021-717 | null | [
{
"commit_message": "[PATCH] Prevent infinite loop/stack overflow in TFLite `while` op. PiperOrigin-RevId: 370800333 Change-Id: I6a2e4ff849da339545c449db2af7e11ce6ff02c3 tensorflow/lite/kernels/while.cc | 2 ++ 1 file changed, 2 insertions(+)",
"patch_text_b64": "RnJvbSA5YzFkYzkyMGQ4ZmZiNDg5M2Q2YzlkMjdkMWYwM... | null | |
CVE-2015-5697 | The get_bitmap_file function in drivers/md/md.c in the Linux kernel before 4.1.6 does not initialize a certain bitmap data structure, which allows local users to obtain sensitive information from kernel memory via a GET_BITMAP_FILE ioctl call. | [
{
"commit_message": "[PATCH] md: use kzalloc() when bitmap is disabled In drivers/md/md.c get_bitmap_file() uses kmalloc() for creating a mdu_bitmap_file_t called \"file\". 5769 file = kmalloc(sizeof(*file), GFP_NOIO); 5770 if (!file) 5771 return -ENOMEM; This structure is copied... | n/a | |
GHSA-g2vx-8v47-4vhh | CakePHP allows remote attackers to modify internal Cake cache and execute arbitrary code | null | [
{
"commit_message": "[PATCH] Fixing issue found by Felix Wilhelm(flxm) where users could send potentially dangerous or corrupted serialized objects to SecurityComponent, potentially allowing manipulation of file map caches. Test case added. cake/libs/controller/components/security.php | 7 +++++- .../controlle... | null |
GHSA-43qc-6x8c-rggm | null | [
{
"commit_message": "[PATCH] fix: [security] Require password confirmations by default - the setting is optional, but the default should be that it's required unless disabled - As reported by Patrix Kontura from ESET app/Config/config.default.php | 1 + 1 file changed, 1 insertion(+)",
"patch_text_b64": "RnJ... | null | |
CVE-2022-2631 | Improper Access Control in tooljet/tooljet | Improper Access Control in GitHub repository tooljet/tooljet prior to v1.19.0. | [
{
"commit_message": "[PATCH] review comments server/src/services/users.service.ts | 5 ++-- .../organization_users.e2e-spec.ts | 27 +++++++++++++++++-- 2 files changed, 28 insertions(+), 4 deletions(-)",
"patch_text_b64": "RnJvbSBiOWZhMjI5YmNhZTM1NmNiYjMzMzAwYjMxNDgzZTk3ZTZlYTE0MGE3IE1vb... | CWE-284 Improper Access Control |
GHSA-jg5g-qq45-3g4q | null | [
{
"commit_message": "[PATCH] Fix transit path validation CVE-2017-6594 Commit f469fc6 (2010-10-02) inadvertently caused the previous hop realm to not be added to the transit path of issued tickets. This may, in some cases, enable bypass of capath policy in Heimdal versions 1.5 through 7.2. Note, this may break... | null | |
GHSA-g65h-35f3-x2w3 | Directus Lacks Session Tokens Invalidation | null | [
{
"commit_message": "[PATCH] Improved session token validation (#22353) Co-authored-by: Pascal Jufer <pascal-jufer@bluewin.ch> .changeset/late-lions-pump.md | 5 ++++ api/src/utils/get-accountability-for-token.ts | 5 ++++ api/src/utils/verify-session-jwt.ts | 26 +++++++++++++++++++ 3 ... | null |
CVE-2025-57803 | ImageMagick (WriteBMPImage): 32-bit integer overflow when writing BMP scanline stride → heap buffer overflow | ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 6.9.13-28 and 7.1.2-2 for ImageMagick's 32-bit build, a 32-bit integer overflow in the BMP encoder’s scanline-stride computation collapses bytes_per_line (stride) to a tiny value while the per-row writer still emits 3 × width bytes for 24-bpp images. The row base pointer advances using the (overflowed) stride, so the first row immediately writes past its slot and into adjacent heap memory with attacker-controlled bytes. This is a classic, powerful primitive for heap corruption in common auto-convert pipelines. This issue has been patched in versions 6.9.13-28 and 7.1.2-2. | [
{
"commit_message": "[PATCH] https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-mxvv-97wh-cfmm coders/bmp.c | 20 ++++++++++++++++---- 1 file changed, 16 insertions(+), 4 deletions(-)",
"patch_text_b64": "RnJvbSAyYzU1MjIxZjRkMzgxOTNhZGNiNTEwNTZjMTRjZjIzOGZiY2MzNWQ3IE1vbiBTZXAgMTcgMDA6MDA6MDA... | CWE-122: Heap-based Buffer Overflow |
GHSA-5668-x27c-mqff | null | [
{
"commit_message": "[PATCH] Fixed check for the number of pixels that will be allocated. coders/rle.c | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSAyYWQ2ZDMzNDkzNzUwYTI4YTVhNjU1ZDMxOWE4ZTBiMTZjMzkyZGUxIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBkaXJrIDxkaXJrQGdpdC5... | null | |
GHSA-77cc-w3wm-6whp | dssp vulnerable to Improper Restriction of XML External Entity Reference | null | [
{
"commit_message": "[PATCH] 5342: fix XML external entity injection .../dssp/client/SignResponseVerifier.java | 24 ++++++++++++------- .../DigitalSignatureServiceMetadata.java | 14 ++++++++++- 2 files changed, 29 insertions(+), 9 deletions(-)",
"patch_text_b64": "RnJvbSBlYzQyMzgzNDk2OTFlYzY2ZGQzMG... | null |
GHSA-h479-2mv4-5c26 | melisplatform/melis-front vulnerable to deserialization of untrusted data | null | [
{
"commit_message": "[PATCH] added allowed_classes=false param to unserialize function and changed interop container to psr container src/Controller/MelisPluginRendererController.php | 2 +- src/Navigation/MelisFrontNavigation.php | 2 +- src/Service/MelisSiteConfigService.php | 4 ++-- 3 files ... | null |
GHSA-vm37-j55j-8655 | OS Command Injection in Microweber | null | [
{
"commit_message": "[PATCH] Update plupload.php src/MicroweberPackages/App/functions/plupload.php | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSAwYTdlNWYxZDgxZGU4ODQ4NjFjYTY3N2VlMWFhYWMzMWYxODhkNjMyIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBCb3poaWRhciBTbGF2ZXlrb3YgPGJvY... | null |
GHSA-4rqq-rxvc-v2rc | Gitea Open Redirect | null | [
{
"commit_message": "[PATCH] Prevent redirect to Host (2) (#19175) (#19186) Backport #19175 Unhelpfully Locations starting with `/\\` will be converted by the browser to `//` because ... well I do not fully understand. Certainly the RFCs and MDN do not indicate that this would be expected. Providing \"compatibi... | null |
GHSA-25xm-hr59-7c27 | github.com/ulikunitz/xz fixes readUvarint Denial of Service (DoS) | null | [
{
"commit_message": "[PATCH] xz: fix a security issue for readUvarint readUvarint could be provided a sequence of bytes where the application would never stop. That is the same issue that has been recently reported for the Go Standard Library as CVE-2020-16845. The fix simply adds a check for the number of byte... | null |
GHSA-x3r8-2hmh-89f5 | Mattermost has an Invite Token Replay Vulnerability via Channel Membership Manipulation | null | [
{
"commit_message": "[PATCH] MM-66372: Improve OAuth state token validation (#34296) (#34299) server/channels/app/oauth.go | 26 ++++- server/channels/app/oauth_test.go | 188 ++++++++++++++++++++++++++++++ 2 files changed, 210 insertions(+), 4 deletions(-)",
"patch_text_b64": "RnJvbSAzNjRjMjIwM2RlMDBmZ... | null |
GHSA-6wwp-p7c5-p9pm | null | [
{
"commit_message": "[PATCH] Use the proper sector size when checking stream offsets (Francisco Alonso and Jan Kaluza at RedHat) src/cdf.c | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-)",
"patch_text_b64": "RnJvbSAzNmZhZGQyOTg0OWI4MDg3YWY5ZjQ1ODZmODlkYmY3NGVhNDViZTY3IE1vbiBTZXAgMTcgMDA6MDA6MDA... | null | |
GHSA-9cqx-pgw7-65x8 | null | [
{
"commit_message": "[PATCH 1/4] ctl: use RUN_DIR env to set DEFAULT_CTL_SOCKET modules/ctl/ctl_defaults.h | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSAwODRlNjhiMzM3ZjNhZmJjODQxMzQ3YTZkMjczOThiYWNmYWYxOTFiIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBWaWN0b3IgU2V2YSA8bGl... | null | |
CVE-2025-67269 | An integer underflow vulnerability exists in the `nextstate()` function in `gpsd/packet.c` of gpsd versions prior to commit `ffa1d6f40bca0b035fc7f5e563160ebb67199da7`. When parsing a NAVCOM packet, the payload length is calculated using `lexer->length = (size_t)c - 4` without checking if the input byte `c` is less than 4. This results in an unsigned integer underflow, setting `lexer->length` to a very large value (near `SIZE_MAX`). The parser then enters a loop attempting to consume this massive number of bytes, causing 100% CPU utilization and a Denial of Service (DoS) condition. | [
{
"commit_message": "[PATCH] gpsd/packet.c: Fix integer underflow is malicious Navcom packet Causes DoS. Fix issue 358 gpsd/packet.c | 64 ++++++++++++++++++++++++++++++++++++++------------- 1 file changed, 48 insertions(+), 16 deletions(-)",
"patch_text_b64": "RnJvbSBmZmExZDZmNDBiY2EwYjAzNWZjN2Y1ZTU2MzE2MG... | n/a | |
CVE-2021-4430 | Ortus Solutions ColdBox Elixir ENV Variable defaultConfig.js information disclosure | A vulnerability classified as problematic has been found in Ortus Solutions ColdBox Elixir 3.1.6. This affects an unknown part of the file src/defaultConfig.js of the component ENV Variable Handler. The manipulation leads to information disclosure. Upgrading to version 3.1.7 is able to address this issue. The identifier of the patch is a3aa62daea2e44c76d08d1eac63768cd928cd69e. It is recommended to upgrade the affected component. The identifier VDB-244485 was assigned to this vulnerability. | [
{
"commit_message": "[PATCH] Fix security vulnerability that echoed out all ENV vars. In a mistaken attempt to make defining ENV vars easier, Elixir would define every ENV var using Webpack's `DefinePlugin`. This was a mistake. The entire ENV of the server generating the bundle would be serialized into an obje... | CWE-200 Information Disclosure |
CVE-2020-27347 | tmux stack buffer overflow in function input_csi_dispatch_sgr_colon | In tmux before version 3.1c the function input_csi_dispatch_sgr_colon() in file input.c contained a stack-based buffer-overflow that can be exploited by terminal output. | [
{
"commit_message": "[PATCH] Do not write after the end of the array and overwrite the stack when colon-separated SGR sequences contain empty arguments. Reported by Sergey Nizovtsev. input.c | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSBhODY4YmFjYjQ2ZTNjOTAwNTMwYmVkN... | CWE-121 Stack-based Buffer Overflow |
CVE-2025-59411 | CubeCart Stored/Reflected HTML Injection Vulnerability in Contact Enquiry | CubeCart is an ecommerce software solution. Prior to version 6.5.11, the contact form’s Enquiry field accepts raw HTML and that HTML is included verbatim in the email sent to the store admin. By submitting HTML in the Enquiry, the admin receives an email containing that HTML. This indicates user input is not being escaped or sanitized before being output in email (and possibly when re-rendering the form), leading to Cross-Site Scripting / HTML injection risk in email clients or admin UI. This issue has been patched in version 6.5.11. | [
{
"commit_message": "[PATCH] CVE-2025-59411 - Patch classes/cubecart.class.php | 2 +- includes/functions.inc.php | 18 ++++++++++++++++++ 2 files changed, 19 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSAyOTkwNjViZDRhODgzNjc4MmNlOTJmNzA5ODhjNzMwZjEzMDc1NmRiIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9t... | CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
CVE-2015-10038 | nym3r0s pplv2 sql injection | A vulnerability was found in nym3r0s pplv2. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to sql injection. The patch is named 28f8b0550104044da09f04659797487c59f85b00. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218023. | [
{
"commit_message": "[PATCH] Added fix for SQL Injection matchday/confirm11.php | 4 ++-- matchday/index.php | 3 +++ matchday/matchday.php | 2 +- matchday/playerInfo.php | 6 +++--- matchday/squadGen.php | 2 +- transfers/balance.php | 2 +- tr... | CWE-89 SQL Injection |
GHSA-vxh4-x6gv-mphf | Cross-Site Request Forgery (CSRF) in livehelperchat/livehelperchat | null | [
{
"commit_message": "[PATCH] CSRF tokens lhc_web/design/defaulttheme/tpl/lhchat/cannedmsgedit.tpl.php | 2 ++ lhc_web/design/defaulttheme/tpl/lhchat/newcannedmsg.tpl.php | 4 +++- lhc_web/modules/lhchat/cannedmsgedit.php | 5 +++++ lhc_web/modules/lhchat/newcannedmsg.php |... | null |
GHSA-ghx4-cgxw-7h9p | LocalAI Cross-site Scripting vulnerability | null | [
{
"commit_message": "[PATCH] fix: roll out bluemonday Sanitize more widely (#3794) * initial pass: roll out bluemonday sanitization more widely Signed-off-by: Dave Lee <dave@gray101.com> * add one additional sanitize - the overall modelslist used by the docs site Signed-off-by: Dave Lee <dave@gray101.com> Signe... | null |
GHSA-jpp7-7chh-cf67 | Cross site scripting in parse-url | null | [
{
"commit_message": "[PATCH] Refactor codebase, upgrade dependencies lib/index.js | 45 +++++++++++++++++++++++++++++++++------------ package.json | 8 ++++---- test/index.js | 27 +++++++++++++++++---------- 3 files changed, 54 insertions(+), 26 deletions(-)",
"patch_text_b64": "RnJvbSAyMWM3MmFiOTQxMjIyOGV... | null |
CVE-2023-40178 | @node-saml/node-saml's validatePostRequestAsync does not include checkTimestampsValidityError | Node-SAML is a SAML library not dependent on any frameworks that runs in Node. The lack of checking of current timestamp allows a LogoutRequest XML to be reused multiple times even when the current time is past the NotOnOrAfter. This could impact the user where they would be logged out from an expired LogoutRequest. In bigger contexts, if LogoutRequests are sent out in mass to different SPs, this could impact many users on a large scale. This issue was patched in version 4.0.5.
| [
{
"commit_message": "[PATCH] Merge pull request from GHSA-vx8m-6fhw-pccw * Added verifyLogoutRequest to validatePostRequestAsync flow * Added bad expiration test * Updated IssueInstance to be in the past src/saml.ts | 1 + test/static/logout_request_with_bad_expiration.xml... | CWE-347: Improper Verification of Cryptographic Signature |
CVE-2020-15081 | Information exposure in the upload directory in PrestaShop | In PrestaShop from version 1.5.0.0 and before 1.7.6.6, there is information exposure in the upload directory. The problem is fixed in version 1.7.6.6. A possible workaround is to add an empty index.php file in the upload directory. | [
{
"commit_message": "[PATCH] Add missing index.php in upload directory .gitignore | 1 + upload/index.php | 35 +++++++++++++++++++++++++++++++++++ 2 files changed, 36 insertions(+) create mode 100644 upload/index.php",
"patch_text_b64": "RnJvbSBmMmE0ZjA4MDRlOTNkMzg5Zjk1Y2I1MWM0M2ZiMzBlMzVlYTg5MjA2IE1v... | {"CWE-548":"Exposure of Information Through Directory Listing"} |
CVE-2015-8746 | fs/nfs/nfs4proc.c in the NFS client in the Linux kernel before 4.2.2 does not properly initialize memory for migration recovery operations, which allows remote NFS servers to cause a denial of service (NULL pointer dereference and panic) via crafted network traffic. | [
{
"commit_message": "[PATCH] NFS: Fix a NULL pointer dereference of migration recovery ops for v4.2 client <nfs-server> # cat /etc/exports /nfs/referal *(rw,insecure,no_subtree_check,no_root_squash,crossmnt) /nfs/old *(ro,insecure,subtree_check,root_squash,crossmnt) <nfs-client> # mount -t nfs nfs-server:... | n/a | |
GHSA-2x84-7422-962r | null | [
{
"commit_message": "[PATCH] Harden env var imports CHANGELOG.md | 2 ++ src/cmd/ksh93/sh/arith.c | 37 ++++++++++++++++++++++----------- src/cmd/ksh93/tests/subshell.sh | 23 ++++++++++++++++++++ 3 files changed, 50 insertions(+), 12 deletions(-)",
"patch_text_b64": "RnJvbSBjN2RlOGI... | null | |
GHSA-hh3v-5chw-wgh7 | ChakraCore RCE Vulnerability | null | [
{
"commit_message": "[PATCH] Change to address CVE-2016-7200,CVE-2016-7201,CVE-2016-7202,CVE-2016-7203,CVE-2016-7208,CVE-2016-7240,CVE-2016-7241,CVE-2016-7242,CVE-2016-7243 Type confusion in Array.prototype.filter Type confusion due to reentrancy can cause a Var to be written into a native int array. Fix by mak... | null |
GHSA-mpjj-r423-4hjc | null | [
{
"commit_message": "[PATCH] Fix #10498 - Fix crash in fuzzed java files (#10511) shlr/java/class.c | 21 ++++++++++++--------- 1 file changed, 12 insertions(+), 9 deletions(-)",
"patch_text_b64": "RnJvbSBlOWNlMGQ2NGZhZjE5ZmE0ZTljMjYwMjUwZmJkZjI1ZTNjMTFlMTUyIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiByYWRhcmU... | null | |
CVE-2016-5703 | SQL injection vulnerability in libraries/central_columns.lib.php in phpMyAdmin 4.4.x before 4.4.15.7 and 4.6.x before 4.6.3 allows remote attackers to execute arbitrary SQL commands via a crafted database name that is mishandled in a central column query. | [
{
"commit_message": "[PATCH] Properly escape database name in central column queries MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Signed-off-by: Michal Čihař <michal@cihar.com> libraries/central_columns.lib.php | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8... | n/a | |
CVE-2023-52077 | External apps using tokens issued by administrators and moderators can call admin APIs | Nexkey is a lightweight fork of Misskey v12 optimized for small to medium size servers. Prior to 12.23Q4.5, Nexkey allows external apps using tokens issued by administrators and moderators to call admin APIs. This allows malicious third-party apps to perform operations such as updating server settings, as well as compromise object storage and email server credentials. This issue has been patched in 12.23Q4.5. | [
{
"commit_message": "[PATCH] =?UTF-8?q?App=E3=81=AF=E7=AE=A1=E7=90=86=E8=80=85/?= =?UTF-8?q?=E3=83=A2=E3=83=87=E3=83=AC=E3=83=BC=E3=82=BF=E6=A8=A9=E9=99=90?= =?UTF-8?q?=E3=82=92=E4=BD=BF=E3=81=88=E3=81=AA=E3=81=84=E3=82=88=E3=81=86?= =?UTF-8?q?=E3=81=AB=20v12=20latest?= MIME-Version: 1.0 Content-Type: text/plai... | CWE-863: Incorrect Authorization |
GHSA-mg4p-mp8h-xq7m | null | [
{
"commit_message": "[PATCH] Fix XSS on login page by removing $_REQUEST[path] resources/login.php | 5 ----- 1 file changed, 5 deletions(-)",
"patch_text_b64": "RnJvbSBjM2I4MTEzOTNkZTYzZTMyNGVhYTY0ZmU1YzllYTNmY2U0MjhmZTFhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBtYXJramNyYW5lIDxtYXJramNyYW5lQGdtYWlsLmNvbT4... | null | |
CVE-2020-11932 | Subiquity server installer logged LUKS full disk encryption password | It was discovered that the Subiquity installer for Ubuntu Server logged the LUKS full disk encryption password if one was entered. | [
{
"commit_message": "[PATCH] write the dm_crypt key to a keyfile, not curtin config subiquity/models/filesystem.py | 11 +++++++++++ 1 file changed, 11 insertions(+)",
"patch_text_b64": "RnJvbSA3ZGI3MDY1MGZlYWY1MTNkN2ZiNmYxY2EwN2YyZDY3MGEwODkwNjEzIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBNaWNoYWVsIEh1ZHNvbi... | CWE-532 Information Exposure Through Log Files |
GHSA-92c8-jh9m-53gp | null | [
{
"commit_message": "[PATCH] v2.0.0-dev (pre-testing) CHANGELOG.md | 17 ++ README.md | 10 +- SECURITY.md | 4 +- _scripts/deploy-tnc-toolbox.sh | 70 ----- _scripts/fix-configs-tnc-toolbox.sh... | null | |
CVE-2025-6545 | pbkdf2 silently returns predictable uninitialized/zero-filled memory for non-normalized or unimplemented algos supported by Node.js | Improper Input Validation vulnerability in pbkdf2 allows Signature Spoofing by Improper Validation. This vulnerability is associated with program files lib/to-buffer.Js.
This issue affects pbkdf2: from 3.0.10 through 3.1.2. | [
{
"commit_message": "[PATCH] hmac ourselves lib/sync.js | 48 +++++++++++++++++++++++++++++++++++++++++++++--- 1 file changed, 45 insertions(+), 3 deletions(-)",
"patch_text_b64": "RnJvbSA5Njk5MDQ1YzM3YTA3ZjgzMTljZmI4ZDQ0ZTJmZjQyNTJkN2E3MDc4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBDYWx2aW4gTWV0Y2FsZiA8Y21l... | CWE-20 Improper Input Validation |
GHSA-x8px-6gf5-46x5 | null | [
{
"commit_message": "[PATCH] Bug #48427 UDN: Forbid vulnerable GET_DN for VERSION >= 3 UDL using PROTOCOL_3 must no longer use GET_DN but WAIT_DN - if it is still used this is a protocol violation. UDL simply will not get an answer. When UCRV 'notifier/protocol/version is set to 3, any old client still using PR... | null | |
CVE-2018-20954 | The "Security and Privacy" Encryption feature in Mailpile before 1.0.0rc4 does not exclude disabled, revoked, and expired keys. | [
{
"commit_message": "[PATCH] First working (but rough) version to omit revoked and disabled keys from Add account-Security and Privacy-Encryption pulldown. mailpile/crypto/gpgi.py | 3 +++ mailpile/plugins/crypto_gnupg.py | 17 +++++++++++++++-- .../html/profiles/account-fo... | n/a | |
GHSA-wh99-p8pv-5qjw | null | [
{
"commit_message": "[PATCH] patch 8.2.3923: Vim9: double free with split argument list in nested function Problem: Vim9: double free if a nested function has a line break in the argument list. Solution: Set cmdlinep when freeing the previous line. src/testdir/test_vim9_func.vim | 20 +++++++++++++++++++- s... | null | |
CVE-2024-47172 | Computer Vision Annotation Tool (CVAT) access control is broken in several PATCH endpoints | Computer Vision Annotation Tool (CVAT) is an interactive video and image annotation tool for computer vision. An attacker with a CVAT account may retrieve certain information about any project, task, job or membership resource on the CVAT instance. The information exposed in this way is the same as the information returned on a GET request to the resource. In addition, the attacker can also alter the default source and target storage associated with any project or task. Upgrade to CVAT 2.19.1 or any later version to fix the issue. | [
{
"commit_message": "[PATCH] Merge commit from fork * Fix security issue when anyone could obtain project|task|job|membership details * Check additional permissions when trying to update task/project target/source storage ...0_124259_maria_fix_patch_security_issue.md | 4 +++ cvat/apps/engine/permissions.py ... | CWE-863: Incorrect Authorization |
CVE-2021-4315 | NYUCCL psiTurk experiment.py special elements used in a template engine | A vulnerability has been found in NYUCCL psiTurk up to 3.2.0 and classified as critical. This vulnerability affects unknown code of the file psiturk/experiment.py. The manipulation of the argument mode leads to improper neutralization of special elements used in a template engine. The exploit has been disclosed to the public and may be used. Upgrading to version 3.2.1 is able to address this issue. The name of the patch is 47787e15cecd66f2aa87687bf852ae0194a4335f. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-219676. | [
{
"commit_message": "[PATCH] Fix SSTI vulnerability in ad and consent pages (#517) * Fix SSTI vulnerability in ad and consent pages Fixed an issue where users could pass arbitrary Python code to be executed on the server to the mode HTTP arg More information about this type of vulnerability: https://secure-cook... | CWE-1336 Improper Neutralization of Special Elements Used in a Template Engine |
GHSA-rpqp-56j6-6mjp | null | [
{
"commit_message": "[PATCH] fixed XSS vulnerability FlatCalXP/demos/Classic/iflateng.htm | 6 +++--- FlatCalXP/demos/Classic/nflateng.htm | 6 +++--- FlatCalXP/demos/Fin445/iflateng.htm | 6 +++--- FlatCalXP/demos/Fin445/nflateng.htm | 6 +++--- FlatCalXP/d... | null | |
GHSA-j5w9-hmfh-4cr6 | TensorFlow has segmentation fault in tfg-translate | null | [
{
"commit_message": "[PATCH] tfg-translate needs to call InitMlir PiperOrigin-RevId: 504566500 tensorflow/core/ir/importexport/BUILD | 1 + tensorflow/core/ir/importexport/tfg-translate.cc | 2 ++ 2 files changed, 3 insertions(+)",
"patch_text_b64": "RnJvbSAyZWVkYzhmNjc2ZDJjM2I4YmU5NDkyZTU0N2IyYmM4... | null |
PYSEC-2021-389 | null | [
{
"commit_message": "[PATCH 1/2] Fix crash of max_pool3d when ksize is 0 or negative This PR tries to address the issue raised in 51936 where max_pool3d will crash when any dim of ksize is 0 or negative. While the original issue was raised toward tf.keras.layers.MaxPooling3D, the issue can also be triggered whe... | null | |
CVE-2023-29008 | SvelteKit framework has Insufficient CSRF protection for CORS requests | The SvelteKit framework offers developers an option to create simple REST APIs. This is done by defining a `+server.js` file, containing endpoint handlers for different HTTP methods.
SvelteKit provides out-of-the-box cross-site request forgery (CSRF) protection to its users. The protection is implemented at `kit/src/runtime/server/respond.js`. While the implementation does a sufficient job of mitigating common CSRF attacks, the protection can be bypassed in versions prior to 1.15.2 by simply specifying an upper-cased `Content-Type` header value. The browser will not send uppercase characters, but this check does not block all expected CORS requests.
If abused, this issue will allow malicious requests to be submitted from third-party domains, which can allow execution of operations within the context of the victim's session, and in extreme scenarios can lead to unauthorized access to users’ accounts. This may lead to all POST operations requiring authentication being allowed in the following cases: If the target site sets `SameSite=None` on its auth cookie and the user visits a malicious site in a Chromium-based browser; if the target site doesn't set the `SameSite` attribute explicitly and the user visits a malicious site with Firefox/Safari with tracking protections turned off; and/or if the user is visiting a malicious site with a very outdated browser.
SvelteKit 1.15.2 contains a patch for this issue. It is also recommended to explicitly set `SameSite` to a value other than `None` on authentication cookies especially if the upgrade cannot be done in a timely manner. | [
{
"commit_message": "[PATCH] Merge pull request from GHSA-gv7g-x59x-wf8f * fix: do a case-insensitive comparison when checking header value * changeset * remove export * Update .changeset/happy-pots-move.md .changeset/happy-pots-move.md | 5 +++++ packages/kit/src/utils/http.js ... | CWE-918: Server-Side Request Forgery (SSRF) |
CVE-2026-22241 | Open eClass has Unrestricted File Upload that Leads to Remote Code Execution (RCE) | The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, an arbitrary file upload vulnerability in the theme import functionality enables an attacker with administrative privileges to upload arbitrary files on the server's file system. The main cause of the issue is that no validation or sanitization of the file's present inside the zip archive. This leads to remote code execution on the web server. Version 4.2 patches the issue. | [
{
"commit_message": "[PATCH] Admin: Sanitize zip file while uploading a new theme. --HG-- branch : 4.2 modules/admin/theme_options.php | 15 ++++++++++++--- 1 file changed, 12 insertions(+), 3 deletions(-)",
"patch_text_b64": "RnJvbSAzZjlkMjY3Yjc5ODEyYTRkZDcwOGJiMTMwMjMzOWU2YTVhYmU2N2Q5IE1vbiBTZXAgMTcgMDA6MD... | CWE-434: Unrestricted Upload of File with Dangerous Type |
CVE-2022-0613 | Authorization Bypass Through User-Controlled Key in medialize/uri.js | Authorization Bypass Through User-Controlled Key in NPM urijs prior to 1.19.8. | [
{
"commit_message": "[PATCH] fix(parse): case insensitive scheme - #412 src/URI.js | 2 +- src/URI.min.js | 2 +- test/urls.js | 49 +++++++++++++++++++++++++++++++++++++++++++++++++ 3 files changed, 51 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSA2ZWE2NDFjYzg2NDhiMDI1ZWQ1ZjMwYjA5MGMyYWJkN... | CWE-639 Authorization Bypass Through User-Controlled Key |
CVE-2025-29922 | kcp allows unauthorized creation and deletion of objects in arbitrary workspaces through APIExport Virtual Workspace | kcp is a Kubernetes-like control plane for form-factors and use-cases beyond Kubernetes and container workloads. Prior to 0.26.3, the identified vulnerability allows creating or deleting an object via the APIExport VirtualWorkspace in any arbitrary target workspace for pre-existing resources. By design, this should only be allowed when the workspace owner decides to give access to an API provider by creating an APIBinding. With this vulnerability, it is possible for an attacker to create and delete objects even if none of these requirements are satisfied, i.e. even if there is no APIBinding in that workspace at all or the workspace owner has created an APIBinding, but rejected a permission claim. A fix for this issue has been identified and has been published with kcp 0.26.3 and 0.27.0. | [
{
"commit_message": "[PATCH 1/3] Add authorizer to APIExport VirtualWorkspace that validates against APIBinding On-behalf-of: SAP <marvin.beckers@sap.com> Signed-off-by: Marvin Beckers <marvin@kubermatic.com> pkg/virtual/apiexport/authorizer/binding.go | 127 ++++++++++++++++++++ pkg/virtual/apiexport/builder/bu... | CWE-285: Improper Authorization |
CVE-2015-20108 | xml_security.rb in the ruby-saml gem before 1.0.0 for Ruby allows XPath injection and code execution because prepared statements are not used. | [
{
"commit_message": "[PATCH] Fix possible xpath injection lib/xml_security.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSA5ODUzNjUxYjk2Yjk5NjUzZWE4NjI3ZDc1N2Q0NmJmZTYyYWI2NDQ4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBTaXh0byBNYXJ0aW4gPHBpdGJ1bGtAZ21haWwuY29tPgpEYXRlOiBX... | n/a | |
GHSA-qxp4-27vx-xmm3 | Improper Input Validation in Jetty | null | [
{
"commit_message": "[PATCH] 637638 limit number of form parameters to avoid DOS .../org/eclipse/jetty/server/Request.java | 25 ++++++-- .../jetty/server/handler/ContextHandler.java | 21 +++++++ .../org/eclipse/jetty/server/RequestTest.java | 62 +++++++++++++++++- .../org/eclipse/jetty/util/UrlEncoded.java... | null |
GHSA-q95h-87j6-273x | Liferay Portal ComboServlet denial of service via large file combination | null | [
{
"commit_message": "[PATCH] LPS-200583 Simplify: enforce number of files for the current request is not higher than combo.max.files value. This still allows caching more files than combo.max.files globally, because we cache many responses. We guarantee however that no element in cache contains more than combo.... | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.