id stringlengths 12 19 | title stringlengths 0 237 | description stringlengths 35 3.87k ⌀ | patches listlengths 1 22 | cwe stringlengths 2 440 ⌀ |
|---|---|---|---|---|
GHSA-xq59-7jf3-rjc6 | piccolo SQL Injection via named transaction savepoints | null | [
{
"commit_message": "[PATCH] Merge pull request from GHSA-xq59-7jf3-rjc6 Co-authored-by: skelmis <ethan.mckee-harris@zxsecurity.co.nz> piccolo/engine/base.py | 15 +++++++++++++++ piccolo/engine/postgres.py | 5 ++++- piccolo/engine/sqlite.py | 5 ++++- tests/engine/test_transaction.py | ... | null |
GHSA-crx8-5gw7-25m9 | null | [
{
"commit_message": "[PATCH] Vulnerabilities fixed, thanks to huntr.dev system/controllers/admin/actions/menu_tree_ajax.php | 2 +- system/controllers/tags/actions/autocomplete.php | 4 ++-- system/core/user.php | 6 ++++-- system/fields/string.php |... | null | |
CVE-2011-1589 | Directory traversal vulnerability in Path.pm in Mojolicious before 1.16 allows remote attackers to read arbitrary files via a %2f..%2f (encoded slash dot dot slash) in a URI. | [
{
"commit_message": "[PATCH] fixed critical security issue that can expose files on your system and prepared emergency release Changes | 6 +++++- lib/Mojo/Path.pm | 4 +++- lib/Mojolicious.pm | 2 +- t/mojo/path.t | 17 ++++++++++++++++- 4 files changed, 25 insertions(+), 4 deletions(-)",
... | n/a | |
GHSA-4j4g-qvh2-m3wx | null | [
{
"commit_message": "[PATCH] vhost: actually track log eventfd file MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit While reviewing vhost log code, I found out that log_file is never set. Note: I haven't tested the change (QEMU doesn't use LOG_FD yet). Cc: stable@vger.k... | null | |
GHSA-x2jp-hh65-4xvf | Cross-site scripting (XSS) and Server side request forgery (SSRF) in moodle | null | [
{
"commit_message": "[PATCH] MDL-70767 feedback: Prevent xss in feedback answer text. mod/feedback/classes/complete_form.php | 2 +- mod/feedback/classes/responses_table.php | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSBhMzAzZWI5ZTllMzg3Zjk1ZWEyYTgwY2IxY2U2YzBiMTMyZWMx... | null |
GHSA-hw4x-q63w-42vp | null | [
{
"commit_message": "[PATCH] Mitigate arbitrary file read With this change the URL is restricted to http and https. So no local files can be read. This still is a Server-side request forgery (SSRF). share/server/core/classes/NagVisHoverUrl.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)",
"patch_te... | null | |
GHSA-qvjc-g5vr-mfgr | Regular Expression Denial of Service in papaparse | null | [
{
"commit_message": "[PATCH] Avoid ReDOS on float dynamic typing (#779) Fixes #777 papaparse.js | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSAyMzVhMTI3NThjZDc3MjY2ZDJlOThmZDcxNWY1MzUzNmIzNGFkNjIxIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBTZXJnaSBBbG1hY2VsbGFzIEFiZWxsYW5hID... | null |
GHSA-vxxr-cwrh-ff4m | null | [
{
"commit_message": "[PATCH] Remove the Export feature. This feature is a security risk; it provided multiple vectors by which contents of files could be exposed. API change: remove Network.Gitit.Export. README.markdown | 9 +- data/default.conf | 9 +- data/templ... | null | |
GHSA-gxmr-6cg7-7q62 | null | [
{
"commit_message": "[PATCH] cred: copy_process() should clear child->replacement_session_keyring keyctl_session_to_parent(task) sets ->replacement_session_keyring, it should be processed and cleared by key_replace_session_keyring(). However, this task can fork before it notices TIF_NOTIFY_RESUME and the new ch... | null | |
GHSA-552p-pmcq-pm57 | null | [
{
"commit_message": "[PATCH] crypto: algif_skcipher - Require setkey before accept(2) Some cipher implementations will crash if you try to use them without calling setkey first. This patch adds a check so that the accept(2) call will fail with -ENOKEY if setkey hasn't been done on the socket yet. Cc: stable@vg... | null | |
GHSA-5v7r-jg9r-vq44 | Insecure Cryptography Algorithm in simple-crypto-js | null | [
{
"commit_message": "[PATCH] Mitigating padding oracle attack src/SimpleCrypto.ts | 39 ++++++++++++++++++++++++++++++++++----- 1 file changed, 34 insertions(+), 5 deletions(-)",
"patch_text_b64": "RnJvbSA3ZTA4MTZiZjUzNDkwYzQxOWMxODBiZjA3OGJiMGRhNjQ1Y2MyN2UxIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBZGl0eWE... | null |
GHSA-r89v-cgv7-3jhx | Bypass of fix for CVE-2020-15247, Twig sandbox escape | null | [
{
"commit_message": "[PATCH] Improve Twig security policy Follow up to https://github.com/octobercms/october/compare/106daa2930de4cebb18732732d47d4056f01dd5b...7cb148c1677373ac30ccfd3069d18098e403e1ca. Thanks to @ka1n4t for the additional review. modules/system/twig/SecurityPolicy.php | 2 ++ 1 file changed, 2 i... | null |
CVE-2021-21363 | Generator Web Application: Local Privilege Escalation Vulnerability via System Temp Directory | swagger-codegen is an open-source project which contains a template-driven engine to generate documentation, API clients and server stubs in different languages by parsing your OpenAPI / Swagger definition. In swagger-codegen before version 2.4.19, on Unix like systems, the system's temporary directory is shared between all users on that system. A collocated user can observe the process of creating a temporary sub directory in the shared temporary directory and race to complete the creation of the temporary subdirectory. This vulnerability is local privilege escalation because the contents of the `outputFolder` can be appended to by an attacker. As such, code written to this directory, when executed can be attacker controlled. For more details refer to the referenced GitHub Security Advisory. This vulnerability is fixed in version 2.4.19. Note this is a distinct vulnerability from CVE-2021-21364. | [
{
"commit_message": "[PATCH] security: use java.nio.files in Generator. .../src/main/java/io/swagger/generator/online/Generator.java | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-)",
"patch_text_b64": "RnJvbSAzYjQwNTM5YjIyNjBmYmYxYzgxOThkY2ViODc5NzU5OWMzOTQ0ZWY3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQp... | CWE-379 Creation of Temporary File in Directory with Incorrect Permissions |
CVE-2025-26153 | A Stored XSS vulnerability exists in the message compose feature of Chamilo LMS 1.11.28. Attackers can inject malicious scripts into messages, which execute when victims, such as administrators, reply to the message. | [
{
"commit_message": "[PATCH] Security: Remove on-attributes when showing an HTML editor in forms Refs advisory GHSA-24cc-9jp9-rxx6 main/inc/lib/formvalidator/Element/HtmlEditor.php | 9 +++++++++ 1 file changed, 9 insertions(+)",
"patch_text_b64": "RnJvbSBiZWIwNzc3MGQ2NzRmY2M5ZGI2ZGYwZTU5YWFiMTA3Njc4YzI4Njgy... | n/a | |
GHSA-hvvv-j3j9-xhr9 | null | [
{
"commit_message": "[PATCH] powerpc/perf: Fix crash in perf_instruction_pointer() when ppmu is not set On systems without any specific PMU driver support registered, running perf record causes Oops. The relevant portion from call trace: BUG: Kernel NULL pointer dereference on read at 0x00000040 Faulting instru... | null | |
CVE-2025-24011 | Umbraco CMS Vulnerable to User Enumeration Feasible Based On Management API Timing and Response Codes | Umbraco is a free and open source .NET content management system. Starting in version 14.0.0 and prior to versions 14.3.2 and 15.1.2, it's possible to determine whether an account exists based on an analysis of response codes and timing of Umbraco management API responses. Versions 14.3.2 and 15.1.2 contain a patch. No known workarounds are available. | [
{
"commit_message": "[PATCH] Merge commit from fork * Add TimedScope * Use TimedScope in login endpoint * Use seperate default duration and only calculate average of actual successful responses * Only return detailed error responses if credentials are valid * Cancel timed scope when credentials are valid * Add ... | CWE-200: Exposure of Sensitive Information to an Unauthorized Actor |
CVE-2024-43803 | BMO can expose particularly named secrets from other namespaces via BMH CRD | The Bare Metal Operator (BMO) implements a Kubernetes API for managing bare metal hosts in Metal3. The `BareMetalHost` (BMH) CRD allows the `userData`, `metaData`, and `networkData` for the provisioned host to be specified as links to Kubernetes Secrets. There are fields for both the `Name` and `Namespace` of the Secret, meaning that versions of the baremetal-operator prior to 0.8.0, 0.6.2, and 0.5.2 will read a `Secret` from any namespace. A user with access to create or edit a `BareMetalHost` can thus exfiltrate a `Secret` from another namespace by using it as e.g. the `userData` for provisioning some host (note that this need not be a real host, it could be a VM somewhere).
BMO will only read a key with the name `value` (or `userData`, `metaData`, or `networkData`), so that limits the exposure somewhat. `value` is probably a pretty common key though. Secrets used by _other_ `BareMetalHost`s in different namespaces are always vulnerable. It is probably relatively unusual for anyone other than cluster administrators to have RBAC access to create/edit a `BareMetalHost`. This vulnerability is only meaningful, if the cluster has users other than administrators and users' privileges are limited to their respective namespaces.
The patch prevents BMO from accepting links to Secrets from other namespaces as BMH input. Any BMH configuration is only read from the same namespace only. The problem is patched in BMO releases v0.7.0, v0.6.2 and v0.5.2 and users should upgrade to those versions. Prior upgrading, duplicate the BMC Secrets to the namespace where the corresponding BMH is. After upgrade, remove the old Secrets. As a workaround, an operator can configure BMO RBAC to be namespace scoped for Secrets, instead of cluster scoped, to prevent BMO from accessing Secrets from other namespaces. | [
{
"commit_message": "[PATCH] Disallow fetching secrets from namespaces different from the host's one The BareMetalHost CRD allows the UserData, MetaData, and NetworkData for the provisioned host to be specified as links to k8s Secrets. There are fields for both the Name and Namespace of the Secret, meaning that... | CWE-200: Exposure of Sensitive Information to an Unauthorized Actor |
GHSA-vm23-73fg-gcq2 | null | [
{
"commit_message": "[PATCH] Fix incorrect bounds check for sector count. (Francisco Alonso and Jan Kaluza at RedHat) src/cdf.c | 9 +++++---- 1 file changed, 5 insertions(+), 4 deletions(-)",
"patch_text_b64": "RnJvbSA0MGJhZGU4MGNiZTJhZjFkMGIyY2QwNDIwY2ViZDVkNTkwNWEyMzgyIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGc... | null | |
CVE-2021-37659 | Out of bounds read via null pointer dereference in TensorFlow | TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can cause undefined behavior via binding a reference to null pointer in all binary cwise operations that don't require broadcasting (e.g., gradients of binary cwise operations). The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/kernels/cwise_ops_common.h#L264) assumes that the two inputs have exactly the same number of elements but does not check that. Hence, when the eigen functor executes it triggers heap OOB reads and undefined behavior due to binding to nullptr. We have patched the issue in GitHub commit 93f428fd1768df147171ed674fee1fc5ab8309ec. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. | [
{
"commit_message": "[PATCH] Fix nullptr deref and heap OOB access in binary cwise ops. PiperOrigin-RevId: 387936777 Change-Id: I608b8074cec36a982cca622b7144cb2c43e6e19f tensorflow/core/kernels/cwise_ops_common.h | 5 +++++ 1 file changed, 5 insertions(+)",
"patch_text_b64": "RnJvbSA5M2Y0MjhmZDE3NjhkZjE0NzE3... | CWE-476: NULL Pointer Dereference |
GHSA-2f7h-crmc-cqw4 | null | [
{
"commit_message": "[PATCH] XSS #2 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Erweiterte Ausgabevalidierung für die normalen Chatfunktionen. Siehe https://www.owasp.org/index.php/XSS Eventuelle Überlegung die Validierung der Datentelegramme serverseitig durchzufüh... | null | |
GHSA-m6wq-66p2-c8pc | Babylon Nil BlockHash in BLS vote extensions triggers panics in consensus handlers | null | [
{
"commit_message": "[PATCH] chore: backport sec adv blk (#1889) * add nil check of block hash * changelog * pr comments * changes based on review comments Co-authored-by: Cirrus Gai <greferry@gmail.com> Co-authored-by: tom <tomasguerraalda@hotmail.com> CHANGELOG.md | 6 ++ cryp... | null |
CVE-2017-15194 | include/global_session.php in Cacti 1.1.25 has XSS related to (1) the URI or (2) the refresh page. | [
{
"commit_message": "[PATCH] XSS fix (#1017) Fix for issue #1010 include/global_session.php | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSA5M2Y2NjFkOGFkY2ZhNjYxOGIxMTUyMmNkYWIzMGU5N2JhZGEzM2ZkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBQYXRyaWNrIDxwYXRyaWNrQHBhdHJpY2tyYW... | n/a | |
GHSA-ppm5-jv84-2xg2 | Aimeos HTML client may potentially reveal sensitive information in error log | null | [
{
"commit_message": "[PATCH] Don't log security relevant data to prevent revealing information src/Client/Html/Checkout/Confirm/Standard.php | 6 +----- 1 file changed, 1 insertion(+), 5 deletions(-)",
"patch_text_b64": "RnJvbSBiYjM4OTYyMGZmYzNjZjRhMmYyOWMxMWExZTVmNTEyMDQ5ZTBjMTMyIE1vbiBTZXAgMTcgMDA6MDA6MDAg... | null |
GHSA-3q8j-9w3h-v6p5 | null | [
{
"commit_message": "[PATCH] Command to show in the UI should not be escaped, but the actual command must be software/apt-lib.pl | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSAxM2Y3YmY5NjIxYTgyZDkzZjFlOWRiZDgzOGQxZTIyMDIwMjIxYmRlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tO... | null | |
GHSA-7pmh-vrww-25xx | freewvs's nested directory structure can interrupt scan | null | [
{
"commit_message": "[PATCH] protect against deep recursion of directories freewvs | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSA4M2E2YjU1YzA0MzVjNjlmNDQ3NDg4Yjc5MTU1NWU2MDc4ODAzMTQzIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiA9P1VURi04P3E/SGFubm89MjBCPUMzPUI2Y2s/PSA8aG... | null |
CVE-2025-62720 | LinkAce: Data Exfiltration via Export Functions Allow Access to All Users' Private Links | LinkAce is a self-hosted archive to collect website links. Versions 2.3.1 and below allow any authenticated user to export the entire database of links from all users in the system, including private links that should only be accessible to their owners. The HTML and CSV export functions in the ExportController class retrieve all links without applying any ownership or visibility filtering, effectively bypassing all access controls implemented elsewhere in the application. This issue is fixed in version 2.4.0. | [
{
"commit_message": "[PATCH] Only export links, lists and tags visible for the user during HTML/CSV export app/Http/Controllers/App/ExportController.php | 8 ++++---- tests/Controller/App/ExportControllerTest.php | 9 +++++++++ 2 files changed, 13 insertions(+), 4 deletions(-)",
"patch_text_b64": "RnJvbSAwYmE... | CWE-200: Exposure of Sensitive Information to an Unauthorized Actor |
GHSA-r659-6fh2-v3gv | null | [
{
"commit_message": "[PATCH] fix sqlcipher_export handling of NULL parameters src/crypto.c | 22 +++++++++++++++++++--- test/sqlcipher-compatibility.test | 26 ++++++++++++++++++++++++++ 2 files changed, 45 insertions(+), 3 deletions(-)",
"patch_text_b64": "RnJvbSBjYjcxZjUzZThjZWE0ODAyNTA... | null | |
GHSA-75j8-mr4c-4x59 | null | [
{
"commit_message": "[PATCH] Fix - Buffer overflow causing segfault - CVE-2023-41101 Signed-off-by: Rob White <rob@blue-wave.net> src/http_microhttpd.c | 133 +++++++++++++++++++++++------------------- 1 file changed, 73 insertions(+), 60 deletions(-)",
"patch_text_b64": "RnJvbSBjMjk0Y2YzMGUwYTI1MTIwNjJjNjZl... | null | |
CVE-2013-4511 | Multiple integer overflows in Alchemy LCD frame-buffer drivers in the Linux kernel before 3.12 allow local users to create a read-write memory mapping for the entirety of kernel memory, and consequently gain privileges, via crafted mmap operations, related to the (1) au1100fb_fb_mmap function in drivers/video/au1100fb.c and the (2) au1200fb_fb_mmap function in drivers/video/au1200fb.c. | [
{
"commit_message": "[PATCH] Fix a few incorrectly checked [io_]remap_pfn_range() calls Nico Golde reports a few straggling uses of [io_]remap_pfn_range() that really should use the vm_iomap_memory() helper. This trivially converts two of them to the helper, and comments about why the third one really needs to... | n/a | |
CVE-2021-3813 | Improper Privilege Management in chatwoot/chatwoot | Improper Privilege Management in GitHub repository chatwoot/chatwoot prior to v2.2. | [
{
"commit_message": "[PATCH] Fix: Conversation filter permissions (#3908) fixes: chatwoot/product#225 app/finders/conversation_finder.rb | 2 +- spec/finders/conversation_finder_spec.rb | 28 ++++++++++++++++++++++++ 2 files changed, 29 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSA5NDU0YzZi... | CWE-269 Improper Privilege Management |
CVE-2020-15263 | XSS in platform | In platform before version 9.4.4, inline attributes are not properly escaped. If the data that came from users was not escaped, then an XSS vulnerability is possible. The issue was introduced in 9.0.0 and fixed in 9.4.4. | [
{
"commit_message": "[PATCH] refs #1313 Escape inline attributes (#1314) CHANGELOG.md | 5 +++++ src/Platform/Dashboard.php | 2 +- src/Screen/Field.php | 10 ++++++---- src/Screen/Fields/Upload.php | 1 - tests/Unit/Screen/Fields/InputTest.php | ... | {"CWE-79":"Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"} |
GHSA-c57m-8jqr-v2wc | null | [
{
"commit_message": "[PATCH] fix xss blog/templatetags/blog_tags.py | 9 ++++++++- djangoblog/utils.py | 10 ++++++++++ templates/comments/tags/comment_item.html | 2 +- templates/comments/tags/comment_item_tree.html | 2 +- 4 files changed, 20 insertions(+), 3 del... | null | |
CVE-2011-4324 | The encode_share_access function in fs/nfs/nfs4xdr.c in the Linux kernel before 2.6.29 allows local users to cause a denial of service (BUG and system crash) by using the mknod system call with a pathname on an NFSv4 filesystem. | [
{
"commit_message": "[PATCH] NFSv4: Convert the open and close ops to use fmode Signed-off-by: Trond Myklebust <Trond.Myklebust@netapp.com> fs/nfs/inode.c | 2 +- fs/nfs/nfs4_fs.h | 8 +-- fs/nfs/nfs4proc.c | 126 ++++++++++++++++++++++------------------ fs/nfs/nfs4state.c | 24 ++++... | n/a | |
GHSA-822f-jfpg-hg7h | Liferay Portal and Liferay DXP fails to check permissions to view sites/groups | null | [
{
"commit_message": "[PATCH] LPS-134264 Ensure that the groups are filtered even if a userId is not passed in. With this users who can update other users can no longer see all sites when assigning users to sites. .../context/SiteBrowserDisplayContext.java | 3 + .../service/impl/GroupLocalServiceImpl.java ... | null |
GHSA-7h5p-mmpp-hgmm | Nuclei Template Signature Verification Bypass | null | [
{
"commit_message": "[PATCH] Merge commit from fork MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit * fix template signature verification * fix signature pattern check * add tests * remove signature count constraint, check for lines len * Add more tests * Centralize sig... | null |
CVE-2021-32717 | Private files publicly accessible with Cloud Storage providers | Shopware is an open source eCommerce platform. In versions prior to 6.4.1.1 private files publicly accessible with Cloud Storage providers when the hashed URL is known. Users are recommend to first change their configuration to set the correct visibility according to the documentation. The visibility must be at the same level as `type`. When the Storage is saved on Amazon AWS we recommending disabling public access to the bucket containing the private files: https://docs.aws.amazon.com/AmazonS3/latest/userguide/access-control-block-public-access.html. Otherwise, update to Shopware 6.4.1.1 or install or update the Security plugin (https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659) and run the command `./bin/console s3:set-visibility` to correct your cloud file visibilities. | [
{
"commit_message": "[PATCH] NEXT-14744 - fix visibility setting in s3 storage fs ...fix-visibility-setting-in-s3-storage-fs.md | 10 ++ .../Command/S3FilesystemVisibilityCommand.php | 112 ++++++++++++++++++ .../Adapter/Filesystem/FilesystemFactory.php | 4 + .../DependencyInjection/services.xml | ... | CWE-200: Exposure of Sensitive Information to an Unauthorized Actor |
GHSA-xfrx-cmv6-fgvj | null | [
{
"commit_message": "[PATCH] Validate width values to avoid unlikely security vulnerabilities. If the database were compromised, a value like `500\" onclick=\"alert(1)\" foo=\"` could be inserted into the `custom_content_width` option, resulting in XSS. If the attacker had full access to the database, then they... | null | |
GHSA-4rwr-8c3m-55f6 | TorrentPier is Vulnerable to Authenticated SQL Injection through Moderator Control Panel's topic_id parameter | null | [
{
"commit_message": "[PATCH] fix(security): prevent SQL injection in moderator panel topic_id parameter (#2216) modcp.php | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-)",
"patch_text_b64": "RnJvbSA2YTBmNjQ5OWQ4OWZhNWQ2ZTJhZmE4ZWU1MzgwMmExYWQxMWVjZTgwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBSb2... | null |
CVE-2024-34068 | Server-side Request Forgery during remote file pull in Pterodactyl wings | Pterodactyl wings is the server control plane for Pterodactyl Panel. An authenticated user who has access to a game server is able to bypass the previously implemented access control (GHSA-6rg3-8h8x-5xfv) that prevents accessing internal endpoints of the node hosting Wings in the pull endpoint. This would allow malicious users to potentially access resources on local networks that would otherwise be inaccessible. This issue has been addressed in version 1.11.2 and users are advised to upgrade. Users unable to upgrade may enable the `api.disable_remote_download` option as a workaround. | [
{
"commit_message": "[PATCH] downloader: move internal subnet validation into http Transport router/downloader/downloader.go | 125 +++++++++++++------------------- 1 file changed, 52 insertions(+), 73 deletions(-)",
"patch_text_b64": "RnJvbSBjMTUyZTM2MTAxYWJhNDVkODg2OGE5YTBlZWI4OTA5OTVlODkzNGI4IE1vbiBTZXAgM... | CWE-284: Improper Access Control |
PYSEC-2021-605 | null | [
{
"commit_message": "[PATCH] fix segfault on string tensors with mismatched dimensions tensorflow/go/tensor.go | 30 +++++++++++++++++------------- 1 file changed, 17 insertions(+), 13 deletions(-)",
"patch_text_b64": "RnJvbSA0OTQ5OWMxNzc5NGIzOWEyYTdkNWJlMmI0NzdlZDdkNTcwNGQwNjI5IE1vbiBTZXAgMTcgMDA6MDA6MDAgMj... | null | |
GHSA-q55m-8f9f-jgg3 | null | [
{
"commit_message": "[PATCH] node delte might fail Change-Id: Ifa3694efacc0e0ac71792b0d67999c946b4f4712 tine20/Filemanager/js/NodeEditDialog.js | 1 + tine20/Filemanager/js/nodeActions.js | 10 +++------- tine20/Tinebase/js/widgets/container/TreePanel.js | 7 +++++-- 3 files changed, 9 ins... | null | |
CVE-2023-4878 | Server-Side Request Forgery (SSRF) in instantsoft/icms2 | Server-Side Request Forgery (SSRF) in GitHub repository instantsoft/icms2 prior to 2.16.1-git. | [
{
"commit_message": "[PATCH] Fixed xss in admin panel, complete fix SSRF in upload by link, option for store via html filter, jQuery v3.7.1, update Toastr. system/controllers/admin/actions/widgets.php | 8 +- .../admin/forms/form_ctypes_basic.php | 1 + .../admin/forms/form_ctypes_dataset.php | ... | CWE-918 Server-Side Request Forgery (SSRF) |
GHSA-cq2q-g8h5-4923 | null | [
{
"commit_message": "[PATCH] (for 4.9.3) CVE-2018-14467/BGP: Fix BGP_CAPCODE_MP. Add a bounds check and a comment to bgp_capabilities_print(). This fixes a buffer over-read discovered by Bhargava Shastry, SecT/TU Berlin. Add a test using the capture file supplied by the reporter(s). print-bgp.c ... | null | |
CVE-2023-25665 | TensorFlow has Null Pointer Error in SparseSparseMaximum | TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, when `SparseSparseMaximum` is given invalid sparse tensors as inputs, it can give a null pointer error. A fix is included in TensorFlow version 2.12 and version 2.11.1. | [
{
"commit_message": "[PATCH] Add validation checks in sparse binary ops. Fixes a nullptr security vulnerability. PiperOrigin-RevId: 503501621 .../kernels/sparse_sparse_binary_op_shared.cc | 43 ++++--------------- .../sparse_ops/sparse_ops_test.py | 13 ++++++ 2 files changed, 21 insertions(+), 35 del... | CWE-476: NULL Pointer Dereference |
CVE-2022-0173 | Out-of-bounds Read in radareorg/radare2 | radare2 is vulnerable to Out-of-bounds Read | [
{
"commit_message": "[PATCH] Fix use-after-free in iobank rbtree usage ##io * See havoc4 bin for reproducer * Reported via huntr.dev by 'Cen Zhang' libr/io/io_bank.c | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSAzNzg5NzIyNmExYTMxZjk4MmJmZWZkYzRhZWVmYzJlNTAzNTVjNzNjIE1v... | CWE-125 Out-of-bounds Read |
CVE-2025-62717 | Emlog Pro session verification code error due to clearing logic error | Emlog is an open source website building system. In version 2.5.23, Emlog Pro is vulnerable to a session verification code error due to a clearing logic error. This means the verification code could be reused anywhere an email verification code is required. This issue has been fixed in commit 1f726df. | [
{
"commit_message": "[PATCH] fix(user): correct session variable name for mail code include/service/user.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSAxZjcyNmRmMGNlNTZhMWJjNmU4MjI1ZGQ5NTM4OTk3NDE3M2JkMGMwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBzbm93IDw0MzQ0MjM1K2Vtb... | CWE-287: Improper Authentication |
CVE-2016-6828 | The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option. | [
{
"commit_message": "[PATCH] tcp: fix use after free in tcp_xmit_retransmit_queue() MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit When tcp_sendmsg() allocates a fresh and empty skb, it puts it at the tail of the write queue using tcp_add_write_queue_tail() Then it att... | n/a | |
GHSA-wf9g-696p-j466 | null | [
{
"commit_message": "[PATCH] dracut.sh: create the initramfs non-world readable also if early cpio is used Fixes: 5f2c30d9bcd614d546d5c55c6897e33f88b9ab90 Previously fixed CVE-2012-4453: e1b48995c26c4f06d1a718539cb1bd5b0179af91 Signed-off-by: Andreas Stieger <astieger@suse.com> dracut.sh | 2 +- 1 file changed, ... | null | |
GHSA-wpwj-69cm-q9c5 | go-mail has insufficient address encoding when passing mail addresses to the SMTP client | null | [
{
"commit_message": "[PATCH 1/7] Refactored recipient handling to make use of net/mail's mail address stringification - Updated `msg.go` to properly format recipient strings. - Fixed tests in `msg_test.go` by ensuring recipient strings use proper formatting with angle brackets. - Added new test for handling quo... | null |
GHSA-g2r3-4g8q-h5rj | Missing authorization in Jenkins Kubernetes Plugin | null | [
{
"commit_message": "[PATCH] [SECURITY-2103] .../jenkins/plugins/kubernetes/KubectlBuildWrapper.java | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSBmMjYxMzAxNDljNDg3YjFlZjhlY2U5YjdiODgxNzM5YzJmOGM2NzM2IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBKZXNzZSBHbGljayA8amds... | null |
GHSA-m2gf-x3f6-8hq3 | Deno is Vulnerable to Command Injection on Windows During Batch File Execution | null | [
{
"commit_message": "[PATCH] fix: reject running `.bat` and `.cmd` directly on windows (#30818) ext/process/lib.rs | 15 +++++++++++++++ tests/unit/command_test.ts | 22 ++++++++++++++++++++++ 2 files changed, 37 insertions(+)",
"patch_text_b64": "RnJvbSA4YTA5OTBjY2QzN2JhZmQ4NzY4MTc2Y2E2NGI5MDZiYTJkYT... | null |
GHSA-35pr-gqm6-r366 | Moodle allows attackers to obtain sensitive personal-contact and unread-message-count information | null | [
{
"commit_message": "[PATCH] MDL-49204 core_message: Checking current user message/index.php | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-)",
"patch_text_b64": "RnJvbSAyOTI0YmExYzczZjllZDNkNTI1OTg3ODA3ZjlkMjg5YjNlYjM4MTU0IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBEYXZpZCBNb25sbGFvIDxkYXZpZG1AbW9vZG... | null |
GHSA-29m4-mx89-3mjg | TYPO3 Denial of Service in Online Media Asset Handling | null | [
{
"commit_message": "[PATCH] [SECURITY] Avoid DoS in Online Media Helper Using large media files (*.youtube, *.vimeo in the TYPO3 core) might lead to denial of service scenarios. In order to avoid that, media files are limited to have a content size of 2048 bytes as a maximum. Usually these files contain just t... | null |
GHSA-rjx6-v474-2ch9 | Segfault in `CompositeTensorVariantToComponents` | null | [
{
"commit_message": "[PATCH] [Security] Add a check for empty variant tensor input to CompositeTensorVariantToComponents. So an exception will be raised instead of segfault. PiperOrigin-RevId: 474397914 tensorflow/core/kernels/composite_tensor_ops.cc | 6 ++++++ .../kernel_tests/composite_tensor_ops_test.py ... | null |
CVE-2025-54572 | Ruby SAML DOS vulnerability with large SAML response | The Ruby SAML library is for implementing the client side of a SAML authorization. In versions 1.18.0 and below, a denial-of-service vulnerability exists in ruby-saml even with the message_max_bytesize setting configured. The vulnerability occurs because the SAML response is validated for Base64 format prior to checking the message size, leading to potential resource exhaustion. This is fixed in version 1.18.1. | [
{
"commit_message": "[PATCH] Prevent DOS due large SAML Message lib/ruby_saml/xml/decoder.rb | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSBmZDJmNTMyODYyYjY0NTMwNjlkNjlkMDdhNTQxZTY2ODYwOWMyYmJjIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBTaXh0byBNYXJ0aW4gPHNpeHRvLm1hcnRpb... | CWE-400: Uncontrolled Resource Consumption |
CVE-2022-24726 | Unauthenticated control plane denial of service attack in Istio | Istio is an open platform to connect, manage, and secure microservices. In affected versions the Istio control plane, istiod, is vulnerable to a request processing error, allowing a malicious attacker that sends a specially crafted message which results in the control plane crashing when the validating webhook for a cluster is exposed publicly. This endpoint is served over TLS port 15017, but does not require any authentication from the attacker. For simple installations, Istiod is typically only reachable from within the cluster, limiting the blast radius. However, for some deployments, especially [external istiod](https://istio.io/latest/docs/setup/install/external-controlplane/) topologies, this port is exposed over the public internet. This issue has been patched in versions 1.13.2, 1.12.5 and 1.11.8. Users are advised to upgrade. Users unable to upgrade should disable access to a validating webhook that is exposed to the public internet or restrict the set of IP addresses that can query it to a set of known, trusted entities. | [
{
"commit_message": "[PATCH] [release-1.13] pilot: limit reads from untrusted inputs (#37792) * pilot: limit reads from untrusted inputs * revert jwks Co-authored-by: John Howard <howardjohn@google.com> pkg/kube/inject/webhook.go | 6 ++++-- pkg/kube/util.go | 26 ++++++++++... | CWE-400: Uncontrolled Resource Consumption |
CVE-2024-29029 | memos vulnerable to an SSRF in /o/get/image | memos is a privacy-first, lightweight note-taking service. In memos 0.13.2, an SSRF vulnerability exists at the /o/get/image that allows unauthenticated users to enumerate the internal network and retrieve images. The response from the image request is then copied into the response of the current server request, causing a reflected XSS vulnerability. Version 0.22.0 of memos removes the vulnerable file. | [
{
"commit_message": "[PATCH] chore: retire legacy api internal/jobs/presign_link.go | 38 +- server/integration/telegram.go | 5 +- server/route/api/v1/auth.go | 253 -- server/route/api/v1/common.go | 15 - server/route/api/v1/docs.go | 3393 -----------------... | CWE-918: Server-Side Request Forgery (SSRF) |
GHSA-gwxv-jv83-6qjr | JStachio XSS vulnerability: Unescaped single quotes | null | [
{
"commit_message": "[PATCH] Fix #157 add more aggressive html5 escaping .../io/jstach/jstachio/escapers/Html.java | 43 ++++++++++++--- .../jstach/jstachio/escapers/HtmlEscaper.java | 54 ++++++++++++++----- .../examples/htmlescaper/HtmlEscapeTest.java | 33 ++++++++++++ .../examples/htmlescaper/package-info... | null |
CVE-2025-9801 | SimStudioAI sim path traversal | A security vulnerability has been detected in SimStudioAI sim up to ed9b9ad83f1a7c61f4392787fb51837d34eeb0af. This affects an unknown part. The manipulation of the argument filePath leads to path traversal. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. This product follows a rolling release approach for continuous delivery, so version details for affected or updated releases are not provided. The identifier of the patch is 45372aece5e05e04b417442417416a52e90ba174. To fix this issue, it is recommended to deploy a patch. | [
{
"commit_message": "[PATCH] fix(files): fix vulnerabilities in file uploads/deletes (#1130) * fix(vulnerability): fix arbitrary file deletion vuln * fix(uploads): fix vuln during upload * cleanup apps/sim/app/api/files/upload/route.test.ts | 187 ++++++++++ apps/sim/app/api/files/upload/route.ts | 36 ... | Path Traversal |
GHSA-qrgf-9gpc-vrxw | Bypass of CSRF protection in the presence of predictable userInfo | null | [
{
"commit_message": "[PATCH] Merge pull request from GHSA-qrgf-9gpc-vrxw * fix: enforce hmac key * fix: check only if fastify/cookie is enabled * fix: restored working testts * fix: update README.md Co-authored-by: Uzlopak <aras.abbasi@googlemail.com> * Update index.d.ts * Update index.test-d.ts * Update index.... | null |
CVE-2021-43798 | Grafana path traversal | Grafana is an open-source platform for monitoring and observability. Grafana versions 8.0.0-beta1 through 8.3.0 (except for patched versions) iss vulnerable to directory traversal, allowing access to local files. The vulnerable URL path is: `<grafana_host_url>/public/plugins//`, where is the plugin ID for any installed plugin. At no time has Grafana Cloud been vulnerable. Users are advised to upgrade to patched versions 8.0.7, 8.1.8, 8.2.7, or 8.3.1. The GitHub Security Advisory contains more information about vulnerable URL paths, mitigation, and the disclosure timeline. | [
{
"commit_message": "[PATCH] Security: Fix directory traversal issue (#42846) * security: fix dir traversal issue (cherry picked from commit 00e38ba555cfb120361c9623de3285d70c60172f) * Improve comments and error message. Co-authored-by: Kyle Brandt <kyle@grafana.com> pkg/api/plugins.go | 19 +++++++++++++++... | CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') |
GHSA-2gxp-6r36-m97r | Cadwyn vulnerable to XSS on the docs page | null | [
{
"commit_message": "[PATCH] Fix reported vulnerability (#290) .all-contributorsrc | 2 +- CHANGELOG.md | 6 ++++++ cadwyn/applications.py | 5 +++-- pyproject.toml | 2 +- uv.lock | 2 +- 5 files changed, 12 insertions(+), 5 deletions(-)",
"patch_text_b64": "RnJvbSBiNDI0ZWNkN... | null |
CVE-2022-2796 | Cross-site Scripting (XSS) - Stored in pimcore/pimcore | Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.4. | [
{
"commit_message": "[PATCH] [Admin] Translations - properly escape key on roweditor .../Resources/public/js/pimcore/settings/translation.js | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSAyZmQ0Njg1OWMxZGVmNmI1YWI3OWFlMmI5Y2I4OGMzMDk3Njk0NDNkIE1vbiBTZXAgMTcgMDA6MDA... | CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
GHSA-mgjw-2wrp-r535 | Remote code execution in xwiki-platform | null | [
{
"commit_message": "[PATCH] XAADMINISTRATION-196: Reset Password fails in private wikis XAADMINISTRATION-197: Make the password reset form compliant with the vertical form standard XAADMINISTRATION-198: Improve translations for the 'Forgot your password or username' application Done, git-svn-id: https://svn.xw... | null |
GHSA-8c93-4hch-xgxp | Cloudflare Wrangler directory traversal vulnerability | null | [
{
"commit_message": "[PATCH] Prevent `wrangler pages dev` from serving asset files outside of the build output directory (#3498) .changeset/fuzzy-flowers-kneel.md | 5 +++++ fixtures/pages-simple-assets/tests/index.test.ts | 12 ++++++++++++ packages/wrangler/src/miniflare-cli/assets.ts | 8 ++... | null |
GHSA-c2jg-hw38-jrqq | Inconsistent Interpretation of HTTP Requests in twisted.web | null | [
{
"commit_message": "[PATCH 01/13] Some tests for GHSA-c2jg-hw38-jrqq src/twisted/web/test/test_http.py | 102 ++++++++++++++++++++++++++++++ 1 file changed, 102 insertions(+)",
"patch_text_b64": "RnJvbSAyMmIwNjc3OTNjYmNkMGZiNWRlZTA0Y2ZkOTExNWZhODVhN2NhMTEwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBUb20gTW9z... | null |
CVE-2021-45098 | An issue was discovered in Suricata before 6.0.4. It is possible to bypass/evade any HTTP-based signature by faking an RST TCP packet with random TCP options of the md5header from the client side. After the three-way handshake, it's possible to inject an RST ACK with a random TCP md5header option. Then, the client can send an HTTP GET request with a forbidden URL. The server will ignore the RST ACK and send the response HTTP packet for the client's request. These packets will not trigger a Suricata reject action. | [
{
"commit_message": "[PATCH] stream/tcp: handle RST with MD5 or AO header Special handling for RST packets if they have an TCP MD5 or AO header option. The options hash can't be validated. The end host might be able to validate it, as it can have a key/password that was communicated out of band. The sender coul... | n/a | |
GHSA-55jh-84jv-8mx8 | Lightning Flow Scanner Vulnerable to Code Injection via Unsafe Use of `new Function()` in APIVersion Rule | null | [
{
"commit_message": "[PATCH] core: fix (CWE-94) when implemented in vs code/ browser env packages/core/src/main/rules/APIVersion.ts | 91 ++++++++++++++-------- 1 file changed, 59 insertions(+), 32 deletions(-)",
"patch_text_b64": "RnJvbSAxMGY2NGE1ZWIxOTNkOGE3NzdlNDUzYjI1ZTkxMDE0NGU0NTQwNzk1IE1vbiBTZXAgMTcgM... | null |
CVE-2022-3242 | HTML code Injection in template search keyword in microweber/microweber | Code Injection in GitHub repository microweber/microweber prior to 1.3.2. | [
{
"commit_message": "[PATCH] update composer.json | 6 +- composer.lock | 890 ++++++++++++++++++++++++-------------------------- 2 files changed, 433 insertions(+), 463 deletions(-)",
"patch_text_b64": "RnJvbSA2OGYwNzIxNTcxNjUzZGI4NjVhNWZhMDFjNzk4NjY0MmM4MmU5MTljIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBQ... | CWE-94 Improper Control of Generation of Code |
CVE-2024-42360 | Command Injection in sequenceserver | SequenceServer lets you rapidly set up a BLAST+ server with an intuitive user interface for personal or group use. Several HTTP endpoints did not properly sanitize user input and/or query parameters. This could be exploited to inject and run unwanted shell commands. This vulnerability has been fixed in 3.1.2. | [
{
"commit_message": "[PATCH 1/4] Move fasta sequence ID to a reusable constant lib/sequenceserver/blast.rb | 6 ++++++ lib/sequenceserver/sequence.rb | 3 +-- 2 files changed, 7 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSA3MTM5Nzk4YTdmMzk1ODBjNTA4NTUxMjNkMDM0MTI4ODM2ZTYyMDgwIE1vbiBTZXAgMTcgMD... | CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') |
GHSA-hcvp-2cc7-jrwr | changedetection.io API endpoint is not secured with API token | null | [
{
"commit_message": "[PATCH] Security update - Adding API token secure check for API endpoint `/api/v1/watch/<uuid>/history` @rozpuszczalny changedetectionio/api/api_v1.py | 1 + 1 file changed, 1 insertion(+)",
"patch_text_b64": "RnJvbSA0MDJmMWU0N2U3OGVjZDE1NWIxZTkwZjMwY2NlNDI0ZmY3NzYzZTBmIE1vbiBTZXAgMTcgMD... | null |
CVE-2024-34083 | STARTTLS unencrypted commands injection | aiosmptd is a reimplementation of the Python stdlib smtpd.py based on asyncio. Prior to version 1.4.6, servers based on aiosmtpd accept extra unencrypted commands after STARTTLS, treating them as if they came from inside the encrypted connection. This could be exploited by a man-in-the-middle attack. Version 1.4.6 contains a patch for the issue. | [
{
"commit_message": "[PATCH] starttls: Clear unencrypted commands from buffer (#380) aiosmtpd/docs/NEWS.rst | 4 ++++ aiosmtpd/smtp.py | 3 +++ 2 files changed, 7 insertions(+)",
"patch_text_b64": "RnJvbSBiM2E0YTJjNmVjZmQyMjg4NTZhMjBkNjM3ZGMzODM1NDFmY2RiZmRhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBcn... | CWE-349: Acceptance of Extraneous Untrusted Data With Trusted Data |
GHSA-9c9v-w225-v5rg | Ghost vulnerable to arbitrary file read via symlinks in content import | null | [
{
"commit_message": "[PATCH] =?UTF-8?q?=F0=9F=94=92=20Fixed=20arbitrary=20file=20read?= =?UTF-8?q?=20via=20symlinks=20in=20content=20import?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit refs https://github.com/TryGhost/Product/issues/3726 refs https://github.com/Try... | null |
CVE-2018-10101 | Before WordPress 4.9.5, the URL validator assumed URLs with the hostname localhost were on the same host as the WordPress server. | [
{
"commit_message": "[PATCH] HTTP: Don't treat `localhost` as same host by default. Built from https://develop.svn.wordpress.org/trunk@42894 git-svn-id: http://core.svn.wordpress.org/trunk@42724 1a063a9b-81f0-0310-95a4-ce76da25c4cd wp-includes/http.php | 2 +- wp-includes/version.php | 2 +- 2 files changed, 2... | n/a | |
GHSA-xw6r-chmh-vpmj | Mailgen has HTML Injection and XSS Filter Bypass in Plaintext Emails | null | [
{
"commit_message": "[PATCH] index.js: Fix additional HTML injection security issue in plaintext e-mails (thanks @edoardottt) index.js | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-)",
"patch_text_b64": "RnJvbSA3Mjc5YTk4MzQ4MWQwNWM1MWFhNDUxZTg2MTQ2Zjk4YWFhNDJmZWU5IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwM... | null |
GHSA-f62v-xpxf-3v68 | Code injection in Apache Ant | null | [
{
"commit_message": "[PATCH] fallback to a separate owner-only tempdir if possible src/main/org/apache/tools/ant/MagicNames.java | 10 +++ .../org/apache/tools/ant/util/FileUtils.java | 36 +++++++++-- .../apache/tools/ant/util/FileUtilsTest.java | 64 +++++++++++++++++++ 3 files changed, 105 insertions(+), 5 de... | null |
GHSA-m2q3-53fq-7h66 | Gollum Exposure of Sensitive Information | null | [
{
"commit_message": "[PATCH] Added security check. lib/gollum/app.rb | 1 + 1 file changed, 1 insertion(+)",
"patch_text_b64": "RnJvbSBjZTY4YTg4MjkzY2UzYjE4YzI2MTMxMjM5MmFkMzNhODhiYjY5ZWExIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBCYXJ0IEthbXBob3JzdCA8YmFydEBrYW1waG9yc3QuY29tPgpEYXRlOiBTdW4sIDIwIFNlcCAyMDE1I... | null |
CVE-2022-2522 | Heap-based Buffer Overflow in vim/vim | Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0061. | [
{
"commit_message": "[PATCH] patch 9.0.0061: ml_get error with nested autocommand Problem: ml_get error with nested autocommand. Solution: Also check line numbers for a nested autocommand. (closes #10761) src/autocmd.c | 6 +++++- src/proto/window.pro | 1 + src/testdir/test_autocmd.... | CWE-122 Heap-based Buffer Overflow |
GHSA-q49x-mf7w-873r | null | [
{
"commit_message": "[PATCH] backend-sql-injection-protection create_user.php delete_user.php edit_user.php Added sql statement using prepare and bind param users.php: Added sql using prepare and bind param Added account number generator always starting with SAVE220 scripts/create_user.php | 40 +++++++++++----... | null | |
CVE-2023-46240 | CodeIgniter4 vulnerable to information disclosure when detailed error report is displayed in production environment | CodeIgniter is a PHP full-stack web framework. Prior to CodeIgniter4 version 4.4.3, if an error or exception occurs, a detailed error report is displayed even if in the production environment. As a result, confidential information may be leaked. Version 4.4.3 contains a patch. As a workaround, replace `ini_set('display_errors', '0')` with `ini_set('display_errors', 'Off')` in `app/Config/Boot/production.php`. | [
{
"commit_message": "[PATCH 1/8] fix: detailed error report is displayed in production environment php > ini_set('display_errors', '0'); php > var_dump(ini_get('display_errors')); string(1) \"0\" php > ini_set('display_errors', 0); php > var_dump(ini_get('display_errors')); string(1) \"0\" php > ini_set('displa... | CWE-209: Generation of Error Message Containing Sensitive Information |
CVE-2022-2128 | Unrestricted Upload of File with Dangerous Type in polonel/trudesk | Unrestricted Upload of File with Dangerous Type in GitHub repository polonel/trudesk prior to 1.2.4. | [
{
"commit_message": "[PATCH] fix(attachments): file type security fix .../containers/Tickets/IssuePartial.jsx | 4 ++- src/controllers/tickets.js | 26 ++++++++++++++++++- src/routes/index.js | 7 ++++- 3 files changed, 34 insertions(+), 3 deletions(-)",
"pa... | CWE-434 Unrestricted Upload of File with Dangerous Type |
GHSA-gw7p-96wm-f9qw | null | [
{
"commit_message": "[PATCH] - replaced unsafe function StringUtils_createStringFromBufferInBuffer with function with length check to not exceed target buffer (LIB61850-447) src/common/inc/string_utilities.h | 3 ++ src/common/string_utilities.c | 12 ++++++ src/iec61850/server/mms_ma... | null | |
CVE-2016-7838 | Untrusted search path vulnerability in WinSparkle versions prior to 0.5.3 allows remote attackers to execute arbitrary code via a specially crafted executable file in an unspecified directory. | [
{
"commit_message": "[PATCH] Verify UpdateTempDir isn't maliciously modified Don't just delete the stored updates temporary directory on launch, but validate the registry key to ensure it is in an expected location and follows WinSparkle's naming convention. This is to prevent malicious users from modifying thi... | Untrusted search path vulnerability | |
CVE-2020-15273 | Cross-Site Scripting in baserCMS | baserCMS before version 4.4.1 is vulnerable to Cross-Site Scripting. The issue affects the following components: Edit feed settings, Edit widget area, Sub site new registration, New category registration. Arbitrary JavaScript may be executed by entering specific characters in the account that can access the file upload function category list, subsite setting list, widget area edit, and feed list on the management screen. The issue was introduced in version 4.0.0. It is fixed in version 4.4.1. | [
{
"commit_message": "[PATCH] =?UTF-8?q?=E3=83=86=E3=83=BC=E3=83=9E=E7=B7=A8=E9=9B=86?= =?UTF-8?q?=E3=81=AE=E8=A8=B1=E5=8F=AF=E8=A8=AD=E5=AE=9A=E5=80=A4=E3=82=92?= =?UTF-8?q?=E8=BF=BD=E5=8A=A0=E3=80=81=E3=83=87=E3=83=95=E3=82=A9=E3=83=AB?= =?UTF-8?q?=E3=83=88=E3=81=A7=E3=81=AF=E7=B7=A8=E9=9B=86=E4=B8=8D=E5=8F=AF... | CWE-79 Cross-site Scripting (XSS) |
CVE-2024-5642 | Buffer overread when using an empty list with SSLContext.set_npn_protocols() | CPython 3.9 and earlier doesn't disallow configuring an empty list ("[]") for SSLContext.set_npn_protocols() which is an invalid value for the underlying OpenSSL API. This results in a buffer over-read when NPN is used (see CVE-2024-5535 for OpenSSL). This vulnerability is of low severity due to NPN being not widely used and specifying an empty list likely being uncommon in-practice (typically a protocol name would be configured). | [
{
"commit_message": "[PATCH] bpo-43669: PEP 644: Require OpenSSL 1.1.1 or newer (GH-23014) - Remove HAVE_X509_VERIFY_PARAM_SET1_HOST check - Update hashopenssl to require OpenSSL 1.1.1 - multissltests only OpenSSL > 1.1.0 - ALPN is always supported - SNI is always supported - Remove deprecated NPN code. Python ... | CWE-1333 Inefficient Regular Expression Complexity |
GHSA-gprr-v9f2-px3c | Azure PromptFlow remote code execution related to Jinja templates | null | [
{
"commit_message": "[PATCH] RCE-fix-promptflow-tools (#3959) src/promptflow-tools/promptflow/tools/common.py | 12 ++++++++++-- src/promptflow-tools/tests/test_common.py | 15 +++++++++++++++ 2 files changed, 25 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSA1ZjRhNDFhYjRjYjE1NjA3YWRlN2YyNjEz... | null |
GHSA-pf55-fj96-xf37 | @lobehub/chat vulnerable to unauthorized access to plugins | null | [
{
"commit_message": "[PATCH] =?UTF-8?q?=F0=9F=9A=91=EF=B8=8F=20fix:=20fix=20plugin=20g?= =?UTF-8?q?ateway=20auth=20(#1195)?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit * 🚑️ fix: fix plugin auth * 💚 fix: fix build * 🐛 fix: fix query of chat settings * 🐛 fix: fix... | null |
GHSA-2hfw-w739-p7x5 | nano-id reduced entropy due to inadequate character set usage | null | [
{
"commit_message": "[PATCH] bump: v0.4.0 Cargo.toml | 2 +- src/lib.rs | 47 ++++++++++++++++++++++++++++++++++++++--------- 2 files changed, 39 insertions(+), 10 deletions(-)",
"patch_text_b64": "RnJvbSAyMjA5YjMxN2FlNGVhNGNhYTk4MmEwOWIwYThlNWMwNjIxZGQ0ZjgzIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBGYW5nZHV... | null |
GHSA-f3v8-7jfc-xgvg | null | [
{
"commit_message": "[PATCH] Prepare 3.6.4 Stable Release administrator/manifests/files/joomla.xml | 2 +- components/com_users/controllers/user.php | 81 ----------------------- libraries/cms/version/version.php | 8 +-- 3 files changed, 5 insertions(+), 86 deletions(-)",
"patch_text_b64": "RnJvbSB... | null | |
GHSA-f756-c9x3-wxmg | null | [
{
"commit_message": "[PATCH] usb: mon: make mmapped memory read only Syzbot found an issue in usbmon module, where the user space client can corrupt the monitor's internal memory, causing the usbmon module to crash the kernel with segfault, UAF, etc. The reproducer mmaps the /dev/usbmon memory to user space, an... | null | |
CVE-2025-14546 | Versions of the package fastapi-sso before 0.19.0 are vulnerable to Cross-site Request Forgery (CSRF) due to the improper validation of the OAuth state parameter during the authentication callback. While the get_login_url method allows for state generation, it does not persist the state or bind it to the user's session. Consequently, the verify_and_process method accepts the state received in the query parameters without verifying it against a trusted local value. This allows a remote attacker to trick a victim into visiting a malicious callback URL, which can result in the attacker's account being linked to the victim's internal account. | [
{
"commit_message": "[PATCH] fix: enforce state validation (#267) fastapi_sso/sso/base.py | 10 ++++++++++ 1 file changed, 10 insertions(+)",
"patch_text_b64": "RnJvbSA2MTE3ZDFhNWFkNDk4YmE1N2Q2NzFlOGEwNTllYmUyMGRiNWFiZTAyIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBkYXZpZGJvcnMtc255ayA8ZGF2aWQuYm9yc0BzbnlrLmlv... | Cross-site Request Forgery (CSRF) | |
GHSA-j86v-p27c-73fm | Unitialized access in `EinsumHelper::ParseEquation` | null | [
{
"commit_message": "[PATCH] Fix EinsumHelper::ParseEquation to avoid uninitialized accesses. EinsumHelper::ParseEquation is supposed to return true or false in input_has_ellipsis and output_has_ellipsis to indicate whether there is ellipsis in the inputs and output. Previously, when there is no ellipsis in the... | null |
CVE-2016-2548 | sound/core/timer.c in the Linux kernel before 4.4.1 retains certain linked lists after a close or stop action, which allows local users to cause a denial of service (system crash) via a crafted ioctl call, related to the (1) snd_timer_close and (2) _snd_timer_stop functions. | [
{
"commit_message": "[PATCH] ALSA: timer: Harden slave timer list handling A slave timer instance might be still accessible in a racy way while operating the master instance as it lacks of locking. Since the master operation is mostly protected with timer->lock, we should cope with it while changing the slave ... | n/a | |
GHSA-2fjw-whxm-9v4q | libnftnl has Heap-based Buffer Overflow in nftnl::Batch::with_page_size (nftnl-rs) | null | [
{
"commit_message": "[PATCH] Panic if Batch::with_page_size would overflow nftnl/src/batch.rs | 7 +++++++ 1 file changed, 7 insertions(+)",
"patch_text_b64": "RnJvbSA5NGEyODZmODdlODhmNDMxOTEzZDE5NjY4MjQ2ZGU5MDA2NzkwMTI1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBKb2FraW0gSHVsdGhlIDxqb2FraW0uaHVsdGhlQG11bGx2Y... | null |
PYSEC-2021-610 | null | [
{
"commit_message": "[PATCH] Fix crash with tf.summary.create_file_writer when non-scalar values are passed This PR tries to fix the issue raised in 46909 where tf.summary.create_file_writer crashes when non-scalar values are passed. This PR fixes 46909. Signed-off-by: Yong Tang <yong.tang.github@outlook.com> t... | null | |
CVE-2024-25641 | Cacti RCE vulnerability when importing packages | Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, an arbitrary file write vulnerability, exploitable through the "Package Import" feature, allows authenticated users having the "Import Templates" permission to execute arbitrary PHP code on the web server. The vulnerability is located within the `import_package()` function defined into the `/lib/import.php` script. The function blindly trusts the filename and file content provided within the XML data, and writes such files into the Cacti base path (or even outside, since path traversal sequences are not filtered). This can be exploited to write or overwrite arbitrary files on the web server, leading to execution of arbitrary PHP code or other security impacts. Version 1.2.27 contains a patch for this issue. | [
{
"commit_message": "[PATCH] Merge pull request from GHSA-7cmj-g5qc-pj88 lib/import.php | 17 ++++++++++++++--- package_import.php | 2 ++ 2 files changed, 16 insertions(+), 3 deletions(-)",
"patch_text_b64": "RnJvbSBlZmYzNWIwZmYyNmNjMjdjODJkNzg4MDQ2OWVkNmQ1ZTNiZWY2MjEwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQp... | CWE-20: Improper Input Validation |
CVE-2018-13304 | In libavcodec in FFmpeg 4.0.1, improper maintenance of the consistency between the context profile field and studio_profile in libavcodec may trigger an assertion failure while converting a crafted AVI file to MPEG4, leading to a denial of service, related to error_resilience.c, h263dec.c, and mpeg4videodec.c. | [
{
"commit_message": "[PATCH] avcodec/mpeg4videodec: Remove use of FF_PROFILE_MPEG4_SIMPLE_STUDIO as indicator of studio profile MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit The profile field is changed by code inside and outside the decoder, its not a reliable indica... | n/a | |
GHSA-whmq-v94q-34p9 | Improper Control of Generation of Code in Apache Struts | null | [
{
"commit_message": "[PATCH] Disable eval expressions git-svn-id: https://svn.apache.org/repos/asf/struts/struts2/branches/STRUTS_2_3_14_X@1469249 13f79535-47bb-0310-9956-ffa450edef68 .../org/apache/struts2/StrutsConstants.java | 3 ++ .../struts2/config/BeanSelectionProvider.java | 1 + .../opensymphony/xwor... | null |
CVE-2020-12058 | Several XSS vulnerabilities in osCommerce CE Phoenix before 1.0.6.0 allow an attacker to inject and execute arbitrary JavaScript code. The malicious code can be injected as follows: the page parameter to catalog/admin/order_status.php, catalog/admin/tax_rates.php, catalog/admin/languages.php, catalog/admin/countries.php, catalog/admin/tax_classes.php, catalog/admin/reviews.php, or catalog/admin/zones.php; or the zpage or spage parameter to catalog/admin/geo_zones.php. | [
{
"commit_message": "[PATCH] Harden _GET page parameter TY to the guys at SISL Chicago admin/advert_manager.php | 4 +-- admin/countries.php | 24 +++++++-------- admin/currencies.php | 20 ++++++------- admin/customer_data_groups.php ... | n/a | |
CVE-2024-36123 | Citizen has a Stored Cross-Site Scripting Vulnerability by editing MediaWiki:Tagline | Citizen is a MediaWiki skin that makes extensions part of the cohesive experience. The page `MediaWiki:Tagline` has its contents used unescaped, so custom HTML (including Javascript) can be injected by someone with the ability to edit the MediaWiki namespace (typically those with the `editinterface` permission, or sysops). This vulnerability is fixed in 2.16.0.
| [
{
"commit_message": "[PATCH] =?UTF-8?q?fix(components):=20=F0=9F=90=9B=20escape=20the?= =?UTF-8?q?=20contents=20of=20MediaWiki:Tagline?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Co-authored-by: BlankEclair <blankeclair@waifu.club> includes/Components/CitizenCompo... | CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.