id
stringlengths
12
19
title
stringlengths
0
237
description
stringlengths
35
3.87k
patches
listlengths
1
22
cwe
stringlengths
2
440
GHSA-66gq-3g6r-6hjw
null
[ { "commit_message": "[PATCH] Fix 1 byte oobread in the cris analysis plugin ##crash libr/anal/p/anal_cris.c | 31 ++++++++++++++++++++++--------- 1 file changed, 22 insertions(+), 9 deletions(-)", "patch_text_b64": "RnJvbSA2MDU3ODViNjVkZDM1NmQ0NmQ0NDg3ZmFhNDFkYmY5MDk0M2I4YmMxIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwM...
null
GHSA-f729-58x4-gqgf
CometVisu Backend for openHAB affected by RCE through path traversal
null
[ { "commit_message": "[PATCH] [cometvisu] Security fixes & cleanup for cometvisu backend (#2671) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit add required authentication for some rest endpoints, add some sanity checks to improve security. Remove code that has been ma...
null
CVE-2026-21440
AdonisJS Path Traversal in Multipart File Handling
AdonisJS is a TypeScript-first web framework. A Path Traversal vulnerability in AdonisJS multipart file handling may allow a remote attacker to write arbitrary files to arbitrary locations on the server filesystem. This impacts @adonisjs/bodyparser through version 10.1.1 and 11.x prerelease versions prior to 11.0.0-next.6. This issue has been patched in @adonisjs/bodyparser versions 10.1.2 and 11.0.0-next.6.
[ { "commit_message": "[PATCH] fix: always generate a random filename when performing move operation src/bodyparser_middleware.ts | 3 ++- src/multipart/file.ts | 6 +++++- tests/body_parser.spec.ts | 10 +++++++--- 3 files changed, 14 insertions(+), 5 deletions(-)", "patch_text_b64": "RnJvbSAxNDNhMT...
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
GHSA-qgfr-5hqp-vrw9
Path Traversal in decompress
null
[ { "commit_message": "[PATCH] Prevent directory traversal (#73) .travis.yml | 6 +-- fixtures/edge_case_dots.tar.gz | Bin 0 -> 318 bytes fixtures/slip.zip | Bin 0 -> 1953 bytes fixtures/slip2.zip | Bin 0 -> 1948 bytes fixtures/slip3.zip ...
null
CVE-2024-12797
RFC7250 handshakes with unauthenticated servers don't abort as expected
Issue summary: Clients using RFC7250 Raw Public Keys (RPKs) to authenticate a server may fail to notice that the server was not authenticated, because handshakes don't abort as expected when the SSL_VERIFY_PEER verification mode is set. Impact summary: TLS and DTLS connections using raw public keys may be vulnerable to man-in-middle attacks when server authentication failure is not detected by clients. RPKs are disabled by default in both TLS clients and TLS servers. The issue only arises when TLS clients explicitly enable RPK use by the server, and the server, likewise, enables sending of an RPK instead of an X.509 certificate chain. The affected clients are those that then rely on the handshake to fail when the server's RPK fails to match one of the expected public keys, by setting the verification mode to SSL_VERIFY_PEER. Clients that enable server-side raw public keys can still find out that raw public key verification failed by calling SSL_get_verify_result(), and those that do, and take appropriate action, are not affected. This issue was introduced in the initial implementation of RPK support in OpenSSL 3.2. The FIPS modules in 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.
[ { "commit_message": "[PATCH] With SSL_VERIFY_PEER client RPK should abort on X509 error While RPK performs X.509 checks correctly, at the SSL layer the SSL_VERIFY_PEER flag was not honoured and connections were allowed to complete even when the server was not verified. The client can of course determine this b...
CWE-392 Missing Report of Error Condition
CVE-2021-26911
core/imap/MCIMAPSession.cpp in Canary Mail before 3.22 has Missing SSL Certificate Validation for IMAP in STARTTLS mode.
[ { "commit_message": "[PATCH] [Core] Check Start/TLS cert src/core/imap/MCIMAPSession.cpp | 7 +++++++ 1 file changed, 7 insertions(+)", "patch_text_b64": "RnJvbSA0NWFjYjRlZmJjYWE1N2EyMGFjNTEyN2RjOTc2NTM4NjcxZmNlMDE4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBEZXYgU2FuZ2hhbmkgPGRldnNhbmdoYW5pQGdtYWlsLmNvbT4KRG...
n/a
GHSA-qhfv-w8w8-3r26
null
[ { "commit_message": "[PATCH] powerpc/tm: Block signal return setting invalid MSR state Currently we allow both the MSR T and S bits to be set by userspace on a signal return. Unfortunately this is a reserved configuration and will cause a TM Bad Thing exception if attempted (via rfid). This patch checks for th...
null
PYSEC-2018-7
null
[ { "commit_message": "[PATCH] Security: prevent timing attack on WEBHOOK_AUTHORIZATION secret Anymail's webhook validation was vulnerable to a timing attack. An attacker could have used this to recover your WEBHOOK_AUTHORIZATION shared secret, potentially allowing them to post fabricated or malicious email track...
null
GHSA-6h67-934r-82g7
Bypass of field access control in strapi-plugin-protected-populate
null
[ { "commit_message": "[PATCH] fix fields always populating ID server/middlewares/helpers/protect-route.js | 11 ++++++----- 1 file changed, 6 insertions(+), 5 deletions(-)", "patch_text_b64": "RnJvbSAwNTQ0MTA2NmQ2NGUwOWRkNTU5MzdkOWYwODk5NjJlOWViZTJmYjM5IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBCb2VnaWUxOSA8Q...
null
CVE-2025-46339
FreshRSS vulnerable to favicon cache poisoning via proxy
FreshRSS is a self-hosted RSS feed aggregator. Prior to version 1.26.2, it's possible to poison feed favicons by adding a given URL as a feed with the proxy set to an attacker-controlled one and disabled SSL verifying. The favicon hash is computed by hashing the feed URL and the salt, whilst not including the following variables: proxy address, proxy protocol, and whether SSL should be verified. Therefore it's possible to poison a favicon of a given feed by simply intercepting the response of the feed, and changing the website URL to one where a threat actor controls the feed favicon. Feed favicons can be replaced for all users by anyone. Version 1.26.2 fixes the issue.
[ { "commit_message": "[PATCH] Improve favicon hash (#7505) * Favicon hash proxy Content provided through a proxy may be completely different, so the feed hash must account for that * Fix typing * Hash of Web site in priority for favicons * Continue * Revert some minor changes app/Models/Feed.php | 56 +++++++++++...
CWE-349: Acceptance of Extraneous Untrusted Data With Trusted Data
CVE-2017-7895
The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lack certain checks for the end of a buffer, which allows remote attackers to trigger pointer-arithmetic errors or possibly have unspecified other impact via crafted requests, related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c.
[ { "commit_message": "[PATCH] nfsd: stricter decoding of write-like NFSv2/v3 ops MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit The NFSv2/v3 code does not systematically check whether we decode past the end of the buffer. This generally appears to be harmless, but ther...
n/a
PYSEC-2021-538
null
[ { "commit_message": "[PATCH] Fix the CHECK failure in tf.raw_ops.QuantizeAndDequantizeV2. PiperOrigin-RevId: 371361603 Change-Id: Ia70e34d41adaadddf928e95e5e5c5c97d5bc60d0 tensorflow/core/kernels/quantize_and_dequantize_op.cc | 3 +++ 1 file changed, 3 insertions(+)", "patch_text_b64": "RnJvbSBjNWIwZDVmOGFjM...
null
GHSA-hpmv-wvq3-gj27
Moodle cross-site request forgery (CSRF) vulnerability
null
[ { "commit_message": "[PATCH] MDL-51091 core_registration: session key check in registration. admin/registration/register.php | 2 ++ admin/settings/top.php | 2 +- 2 files changed, 3 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA0YmI5ZTFhZDhhZjEyYjAxNDk5YzY4NTQzZTgwZjdjMTJmZDU1N2VhIE1vbiBT...
null
CVE-2023-4752
Use After Free in vim/vim
Use After Free in GitHub repository vim/vim prior to 9.0.1858.
[ { "commit_message": "[PATCH] patch 9.0.1858: [security] heap use after free in ins_compl_get_exp() Problem: heap use after free in ins_compl_get_exp() Solution: validate buffer before accessing it Signed-off-by: Christian Brabandt <cb@256bit.org> src/insexpand.c | 2 +- src/testdir/crash/poc_...
CWE-416 Use After Free
CVE-2020-36281
Leptonica before 1.80.0 allows a heap-based buffer over-read in pixFewColorsOctcubeQuantMixed in colorquant1.c.
[ { "commit_message": "[PATCH] Fixed issue 22140 in oss-fuzz: Heap-buffer-overflow * color quantized pix must be 8 bpp before extra colors are added. src/colorquant1.c | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA1ZWUyNGIzOThiYjY3NjY2ZjZkMTczNzYzZWFhZWRkOWMzNmZiMWU1IE...
n/a
CVE-2024-43411
CKEditor4 has a low risk cross-site scripting (XSS) vulnerability from domain takeover
CKEditor4 is an open source what-you-see-is-what-you-get HTML editor. A theoretical vulnerability has been identified in CKEditor 4.22 (and above). In a highly unlikely scenario where an attacker gains control over the https://cke4.ckeditor.com domain, they could potentially execute an attack on CKEditor 4 instances. The issue impacts only editor instances with enabled version notifications. Please note that this feature is disabled by default in all CKEditor 4 LTS versions. Therefore, if you use CKEditor 4 LTS, it is highly unlikely that you are affected by this vulnerability. If you are unsure, please contact us. The fix is available in version 4.25.0-lts.
[ { "commit_message": "[PATCH 1/3] Update version-check core/ckeditor_version-check.js | 13 +++++++++---- 1 file changed, 9 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSBhMjllNGZkNTkwNGRhNWYyZDI5ZGM3N2RhOWJhYWM3NmExNGNhMjY2IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBLYXJvbERhd2lkeml1ayA8a2FybDE5OTU...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-21219
Cross Site Scripting (XSS) vulnerability in Netgate pf Sense 2.4.4-Release-p3 and Netgate ACME package 0.6.3 allows remote attackers to to run arbitrary code via the RootFolder field to acme_certificate_edit.php page of the ACME package.
[ { "commit_message": "[PATCH] Prevent ACME output from being interpreted as HTML. Fixes #9888 security/pfSense-pkg-acme/Makefile | 1 + .../pfSense-pkg-acme/files/usr/local/pkg/acme/acme_sh.inc | 2 +- .../files/usr/local/www/acme/acme_accountkeys.php | 4 ++-- .../files/u...
n/a
CVE-2019-25050
netCDF in GDAL 2.4.2 through 3.0.4 has a stack-based buffer overflow in nc4_get_att (called from nc4_get_att_tc and nc_get_att_text) and in uffd_cleanup (called from netCDFDataset::~netCDFDataset and netCDFDataset::~netCDFDataset).
[ { "commit_message": "[PATCH] netCDF: avoid buffer overflow. master only. Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15143. Credit to OSS Fuzz gdal/frmts/netcdf/netcdfsg.cpp | 15 +++++---------- 1 file changed, 5 insertions(+), 10 deletions(-)", "patch_text_b64": "RnJvbSA3NjdlM2E1NjE0NGY2NzZ...
n/a
CVE-2022-25882
Versions of the package onnx before 1.13.0 are vulnerable to Directory Traversal as the external_data field of the tensor proto can have a path to the file which is outside the model current directory or user-provided directory, for example "../../../etc/passwd"
[ { "commit_message": "[PATCH] Do not allow to read tensor's external_data outside the model directory (#4400) * Not allow to read tensor external_data outside the model directory Signed-off-by: jnovikov <johnnovikov0@gmail.com> * Fix formatting errors Signed-off-by: jnovikov <johnnovikov0@gmail.com> * Disable se...
Directory Traversal
CVE-2024-53866
pnpm vulnerable to no-script global cache poisoning via overrides / `ignore-scripts` evasion
The package manager pnpm prior to version 9.15.0 seems to mishandle overrides and global cache: Overrides from one workspace leak into npm metadata saved in global cache; npm metadata from global cache affects other workspaces; and installs by default don't revalidate the data (including on first lockfile generation). This can make workspace A (even running with `ignore-scripts=true`) posion global cache and execute scripts in workspace B. Users generally expect `ignore-scripts` to be sufficient to prevent immediate code execution on install (e.g. when the tree is just repacked/bundled without executing it). Here, that expectation is broken. Global state integrity is lost via operations that one would expect to be secure, enabling subsequently running arbitrary code execution on installs. Version 9.15.0 fixes the issue. As a work-around, use separate cache and store dirs in each workspace.
[ { "commit_message": "[PATCH] Merge commit from fork .changeset/silent-wombats-roll.md | 6 ++++++ resolving/npm-resolver/src/pickPackage.ts | 8 +++++--- resolving/npm-resolver/test/index.ts | 21 +++++++++++++++++++++ 3 files changed, 32 insertions(+), 3 deletions(-) create mode 100644 .changeset/s...
CWE-426: Untrusted Search Path
GHSA-ppv3-px64-q9mx
null
[ { "commit_message": "[PATCH] Fix fido2 signature validation bug src/scheme/webauthn.c | 9 ++++++++- 1 file changed, 8 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAwZWZkMTEyYmI2MmY1NjY4Nzc3NTBhZDYyZWU4MjhiZmY1NzliNGUyIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBiYWJlbG91ZXN0IDxnaXRodWJAYmFiZWxvdWVz...
null
GHSA-hff2-x2j9-gxgv
Keylime: unhandled exceptions could lead to invalid attestation states
null
[ { "commit_message": "[PATCH] Fix proper exception handling and impedance match in `tornado_requests` (#1128) * Proper exception handling in tornado_requests Signed-off-by: George Almasi <gheorghe@us.ibm.com> Co-authored-by: George Almasi <gheorghe@us.ibm.com> keylime/tornado_requests.py | 5 +++-- 1 file changed...
null
GHSA-pgvc-6h2p-q4f6
Umbraco CMS disclosure of configured password requirements
null
[ { "commit_message": "[PATCH] Merge commit from fork .../Controllers/AuthenticationController.cs | 19 +++++++++++++++---- .../Controllers/BackOfficeController.cs | 5 +++++ .../Extensions/HttpContextExtensions.cs | 11 +++++++++++ 3 files changed, 31 insertions(+), 4 deletions(-)", "patch_text_b...
null
GHSA-p9jm-j7j3-qc5g
null
[ { "commit_message": "[PATCH] fix: for issue #584 fuel/modules/fuel/controllers/Login.php | 40 +++++++++++++++---- .../fuel/language/english/fuel_lang.php | 1 + 2 files changed, 34 insertions(+), 7 deletions(-)", "patch_text_b64": "RnJvbSA2MTY0Y2Q3OTQ2NzRkNGQ3NGRhMzlmOGI1MzVmZjU4OGFiMDA2ZTMzIE1v...
null
GHSA-p2pf-g8cq-3gq5
teler-waf contains detection rule bypass via Entities payload
null
[ { "commit_message": "[PATCH] feat: Added case-insensitivity detects the IE octal/hex/unicode entities Modified the regular expression rule for handling escape characters by adding the case-insensitive `(?i)` flag to the rule. This change ensures that the regular expression will match escape characters regardles...
null
CVE-2024-28860
Insecure IPsec transport encryption in Cilium
Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Users of IPsec transparent encryption in Cilium may be vulnerable to cryptographic attacks that render the transparent encryption ineffective. In particular, Cilium is vulnerable to chosen plaintext, key recovery, replay attacks by a man-in-the-middle attacker. These attacks are possible due to an ESP sequence number collision when multiple nodes are configured with the same key. Fixed versions of Cilium use unique keys for each IPsec tunnel established between nodes, resolving all of the above attacks. This vulnerability is fixed in 1.13.13, 1.14.9, and 1.15.3.
[ { "commit_message": "[PATCH] ipsec: fix per-node-pair-key computation MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit This commit ensures that - each time we compute a per-node-pair-key we create an empty slice with the correct length first, and then append all the inpu...
CWE-326: Inadequate Encryption Strength
CVE-2025-53945
apko has incorrect permission (0666) in /etc/ld.so.cache and other files
apko allows users to build and publish OCI container images built from apk packages. Starting in version 0.27.0 and prior to version 0.29.5, critical files were inadvertently set to 0666, which could likely be abused for root escalation. Version 0.29.5 contains a fix for the issue.
[ { "commit_message": "[PATCH] generate /etc/ld.so.cache (#1629) `/etc/ld.so.cache` is a cache file of all of the public shared libraries on the system. At runtime, the linker looks for libraries here first before falling back to searching a built-in list of directories (`/lib`, `/usr/lib`, `/usr/local/lib`, etc ...
CWE-276: Incorrect Default Permissions
GHSA-hg37-8m7v-x2rc
null
[ { "commit_message": "[PATCH] fscrypt: remove broken support for detecting keyring key revocation Filesystem encryption ostensibly supported revoking a keyring key that had been used to \"unlock\" encrypted files, causing those files to become \"locked\" again. This was, however, buggy for several reasons, the ...
null
CVE-2022-31006
Hyperledger Indy DOS vulnerability
indy-node is the server portion of Hyperledger Indy, a distributed ledger purpose-built for decentralized identity. In vulnerable versions of indy-node, an attacker can max out the number of client connections allowed by the ledger, leaving the ledger unable to be used for its intended purpose. However, the ledger content will not be impacted and the ledger will resume functioning after the attack. This attack exploits the trade-off between resilience and availability. Any protection against abusive client connections will also prevent the network being accessed by certain legitimate users. As a result, validator nodes must tune their firewall rules to ensure the right trade-off for their network's expected users. The guidance to network operators for the use of firewall rules in the deployment of Indy networks has been modified to better protect against denial of service attacks by increasing the cost and complexity in mounting such attacks. The mitigation for this vulnerability is not in the Hyperledger Indy code per se, but rather in the individual deployments of Indy. The mitigations should be applied to all deployments of Indy, and are not related to a particular release.
[ { "commit_message": "[PATCH 1/5] Update setup_iptables script - Retain overall connection limit - Limit the number of connections per IP address - Rate limit the connections per IP address. - Add support for deleting (-d) the rules added by the script. - Update usage and warning documentation. Signed-off-by: Wa...
CWE-400: Uncontrolled Resource Consumption
GHSA-hfg3-f7fm-c9xc
null
[ { "commit_message": "[PATCH] axohelp 1.3 git-svn-id: svn://tug.org/texlive/trunk/Build/source@52042 c570f23f-e606-0410-a88d-b1316a301751 utils/axodraw2/ChangeLog | 5 + utils/axodraw2/TLpatches/TL-Changes | 3 +- utils/axodraw2/axodraw2-src/ChangeLog | 5 + utils/axodraw2/...
null
PYSEC-2024-162
null
[ { "commit_message": "[PATCH 01/18] Set an arbitrary upper limit on ReDoS-vulnerable regexps docs/news.rst | 28 ++++++++++++++++++++++++++++ scrapy/utils/iterators.py | 12 +++++++----- scrapy/utils/response.py | 4 ++-- 3 files changed, 37 insertions(+), 7 deletions(-)", "patch_text_b64": "RnJvb...
null
CVE-2023-33970
Missing access control in internal task links feature in Kanboard
Kanboard is open source project management software that focuses on the Kanban methodology. A vulnerability related to a `missing access control` was found, which allows a User with the lowest privileges to leak all the tasks and projects titles within the software, even if they are not invited or it's a personal project. This could also lead to private/critical information being leaked if such information is in the title. This issue has been addressed in version 1.2.30. Users are advised to upgrade. There are no known workarounds for this vulnerability.
[ { "commit_message": "[PATCH] Add missing permission check when creating/updating internal links app/Api/Procedure/TaskLinkProcedure.php | 18 ++++++++++++++++++ app/Controller/TaskInternalLinkController.php | 13 +++++++++++++ 2 files changed, 31 insertions(+)", "patch_text_b64": "RnJvbSBiNTAxZWY0NGJjMj...
CWE-862: Missing Authorization
GHSA-9jgg-88mc-972h
webpack-dev-server users' source code may be stolen when they access a malicious web site with non-Chromium based browser
null
[ { "commit_message": "[PATCH] Merge commit from fork BREAKING CHANGE: cross origin requests are not allowed unless allowed by `Access-Control-Allow-Origin` header lib/Server.js | 26 ++++++ test/e2e/cross-origin-request.test.js | 118 ++++++++++++++++++++++++++ test/ports-map.js ...
null
GHSA-qg36-9jxh-fj25
Incorrect signature verification in django-ses
null
[ { "commit_message": "[PATCH] Restrict amazonaws allowed certificate URLs. django_ses/utils.py | 82 +++++++++++++++++++++++++++------------------ 1 file changed, 50 insertions(+), 32 deletions(-)", "patch_text_b64": "RnJvbSBiNzFiNWY0MTMyOTNhMTM5OTdiNmU2MzE0MDg2Y2I5YzIyNjI5Nzk1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAw...
null
GHSA-xc7w-jvhx-p6q9
Cobbler Path Traversal vulnerability
null
[ { "commit_message": "[PATCH] Add strict kickstart check in the API, again should fix #939. cobbler/remote.py | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA4MjMyYzBlODhlYzczODJkM2Y4ZDNiZjQ4YzgxYTRhOTFhYzQzMjVkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiA9P1VURi04P3E/Sj1D...
null
GHSA-2w7f-f8wc-vhx7
null
[ { "commit_message": "[PATCH] Update README.md README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBhN2YyMmExMzNjMTg4ZDIxZDU1MzJmZDBlZWUyM2QxNzcxYTBlNTg2IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBTYWlmZWRkaW5lIEFMT1VJIDxhbG91aS5zZWlmZWRkaW5lQGdtYWlsLmNvbT4KRGF0ZTogVGh1LC...
null
GHSA-v7w9-63xh-6r3w
LibreNMS has a Reflected XSS ('Cross-site Scripting') in librenms/includes/functions.php
null
[ { "commit_message": "[PATCH] Fix xss in report_this (#16613) https://github.com/librenms/librenms/security/advisories/GHSA-v7w9-63xh-6r3w includes/functions.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA2YTE0YTliZDc2N2M2ZTQ1MmU0ZGY3N2EyNDEyNmMzZWViOTNkY2JmIE1vbiBTZXAgM...
null
CVE-2017-13045
The VQP parser in tcpdump before 4.9.2 has a buffer over-read in print-vqp.c:vqp_print().
[ { "commit_message": "[PATCH] CVE-2017-13045/VQP: add some bounds checks This fixes a buffer over-read discovered by Bhargava Shastry, SecT/TU Berlin. Add a test using the capture file supplied by the reporter(s). print-vqp.c | 14 +++++++++++++- tests/TESTLIST | 1 + tests/vqp-oobr.out | 4 ++++...
n/a
CVE-2020-15236
Directory Traversal in Wiki.js
In Wiki.js before version 2.5.151, directory traversal outside of Wiki.js context is possible when a storage module with local asset cache fetching is enabled. A malicious user can potentially read any file on the file system by crafting a special URL that allows for directory traversal. This is only possible when a storage module implementing local asset cache (e.g Local File System or Git) is enabled and that no web application firewall solution (e.g. cloudflare) strips potentially malicious URLs. Commit 084dcd69d1591586ee4752101e675d5f0ac6dcdc fixes this vulnerability by sanitizing the path before it is passed on to the storage module. The sanitization step removes any directory traversal (e.g. `..` and `.`) sequences as well as invalid filesystem characters from the path. As a workaround, disable any storage module with local asset caching capabilities such as Local File System and Git.
[ { "commit_message": "[PATCH] fix: strip directory traversal sequences from asset paths server/helpers/page.js | 10 ++++++++-- 1 file changed, 8 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSAwODRkY2Q2OWQxNTkxNTg2ZWU0NzUyMTAxZTY3NWQ1ZjBhYzZkY2RjIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBOR1BpeGVsI...
{"CWE-22":"Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"}
CVE-2020-35848
Agentejo Cockpit before 0.11.2 allows NoSQL injection via the Controller/Auth.php newpassword function.
[ { "commit_message": "[PATCH] fix possible security issue for login modules/Cockpit/Controller/Auth.php | 18 +++++++++++++++++- 1 file changed, 17 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA3OWZjOTYzMWZmYTI5MTQ2ZTMxMjRjZWFmOTk4NzliOTJlMWVmMjRiIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBcnR1ciBI...
n/a
CVE-2007-10002
web-cyradm auth.inc.php sql injection
A vulnerability, which was classified as critical, has been found in web-cyradm. Affected by this issue is some unknown functionality of the file auth.inc.php. The manipulation of the argument login/login_password/LANG leads to sql injection. The attack may be launched remotely. The name of the patch is 2bcbead3bdb5f118bf2c38c541eaa73c29dcc90f. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217640.
[ { "commit_message": "[PATCH] Prevention of SQL injection auth.inc.php | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSAyYmNiZWFkM2JkYjVmMTE4YmYyYzM4YzU0MWVhYTczYzI5ZGNjOTBmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBsdWMgPGx1Y0AxYjUzYTEzZS0wODE5LTA0MTAtOGZjMi1jZjM3NmZlNj...
CWE-89 SQL Injection
CVE-2022-35989
`CHECK` fail in `MaxPool` in TensorFlow
TensorFlow is an open source platform for machine learning. When `MaxPool` receives a window size input array `ksize` with dimensions greater than its input tensor `input`, the GPU kernel gives a `CHECK` fail that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 32d7bd3defd134f21a4e344c8dfd40099aaf6b18. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[ { "commit_message": "[PATCH] Fix MaxPool crash on GPU for invalid filter size. If the filter size exceeds the input size by one for `VALID` padding, return an empty tensor. This is consistent with XLA. PiperOrigin-RevId: 462684864 tensorflow/core/kernels/maxpooling_op.cc | 7 +++++++ .../python/kern...
CWE-617: Reachable Assertion
GHSA-737w-mh58-cxjp
Arbitrary code execution in Apache Struts
null
[ { "commit_message": "[PATCH] Disable eval expressions git-svn-id: https://svn.apache.org/repos/asf/struts/struts2/branches/STRUTS_2_3_14_X@1469249 13f79535-47bb-0310-9956-ffa450edef68 .../org/apache/struts2/StrutsConstants.java | 3 ++ .../struts2/config/BeanSelectionProvider.java | 1 + .../opensymphony/xwor...
null
CVE-2023-4007
Cross-site Scripting (XSS) - Stored in thorsten/phpmyfaq
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.16.
[ { "commit_message": "[PATCH] fix: added missing conversion to HTML entities phpmyfaq/src/phpMyFAQ/Link.php | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSA0MGViOTY4NTE5ODEyODkwOGU4M2MyYmVmNGMyMjg3NTFmZDQzYTBlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBUaG9yc3RlbiBSaW5...
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-vwj8-4grf-3r8v
Liferay Portal and Liferay DXP fails to invalidate password reset tokens after use
null
[ { "commit_message": "[PATCH] LPS-108642 Once change the password, we need to invalidate the password reset link .../service/impl/UserLocalServiceImpl.java | 25 ++++++++++++++++++- 1 file changed, 24 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA4ZjA3MmVlODUyN2ExZGQ1YzBmZmE5MWM0YTc4NjQxZDBlNjY2...
null
PYSEC-2021-417
null
[ { "commit_message": "[PATCH] Prevent unitialized variable use in grappler. PiperOrigin-RevId: 399702928 Change-Id: Id7e75451fbff297692dfb687f60ea04b25c96b24 .../core/grappler/optimizers/auto_parallel.cc | 2 +- .../grappler/optimizers/auto_parallel_test.cc | 24 +++++++++++++++++++ 2 files changed, 25 insertions...
null
CVE-2023-50252
php-svg-lib unsafe attributes merge when parsing `use` tag
php-svg-lib is an SVG file parsing / rendering library. Prior to version 0.5.1, when handling `<use>` tag that references an `<image>` tag, it merges the attributes from the `<use>` tag to the `<image>` tag. The problem pops up especially when the `href` attribute from the `<use>` tag has not been sanitized. This can lead to an unsafe file read that can cause PHAR Deserialization vulnerability in PHP prior to version 8. Version 0.5.1 contains a patch for this issue.
[ { "commit_message": "[PATCH] Do not merge additional USE element attributes src/Svg/Tag/UseTag.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAwOGNlNmE5NmQ2M2FkNzIxNjMxNWZhZTM0YTYxYzg4NmRkMmRjMDMwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBCcmlhbiBTd2VlbmV5IDxic3dlZW5leUB...
CWE-15: External Control of System or Configuration Setting
GHSA-r5jw-62xg-j433
Cross-Site Scripting in Kaminari
null
[ { "commit_message": "[PATCH] Blacklist \"original_script_name\" get param kaminari-core/lib/kaminari/helpers/tags.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA4ZGQ1MmExYWVkM2QyZmEyODM1ZDgzNmRlMjNmYzBkOGM0ZmY1ZGI4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBEYW5pZWwgTWlyY...
null
CVE-2015-3185
The ap_some_auth_required function in server/request.c in the Apache HTTP Server 2.4.x before 2.4.14 does not consider that a Require directive may be associated with an authorization setting rather than an authentication setting, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging the presence of a module that relies on the 2.2 API behavior.
[ { "commit_message": "[PATCH] SECURITY: CVE-2015-3183 (cve.mitre.org) Replacement of ap_some_auth_required (unusable in Apache httpd 2.4) with new ap_some_authn_required and ap_force_authn hook. Submitted by: breser git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1684524 13f79535-47bb-0310-9956-ff...
n/a
PYSEC-2025-43
null
[ { "commit_message": "[PATCH] [Security] Fix image hash collision (#17378) Signed-off-by: DarkLight1337 <tlleungac@connect.ust.hk> tests/multimodal/assets/image1.png | Bin 0 -> 1837 bytes tests/multimodal/assets/image2.png | Bin 0 -> 1837 bytes tests/multimodal/test_hasher.py | 61 +++++++++++++++++++++++++++...
null
GHSA-r2f7-w5vx-9jgx
null
[ { "commit_message": "[PATCH] =?UTF-8?q?=E4=BF=AE=E5=A4=8D=E5=88=87=E6=8D=A2=E8=AF=AD?= =?UTF-8?q?=E8=A8=80=E9=87=8D=E5=AE=9A=E5=90=91=E9=A1=B5=E9=9D=A2=E5=8F=AF?= =?UTF-8?q?=E8=A2=AB=E7=94=A8=E6=88=B7=E6=8E=A7=E5=88=B6=E7=9A=84=E6=BC=8F?= =?UTF-8?q?=E6=B4=9E?= MIME-Version: 1.0 Content-Type: text/plain; charset...
null
GHSA-7qfw-j7hp-v45g
Django WSGI Header Spoofing Vulnerability
null
[ { "commit_message": "[PATCH] [1.7.x] Stripped headers containing underscores to prevent spoofing in WSGI environ. This is a security fix. Disclosure following shortly. Thanks to Jedediah Smith for the report. django/core/servers/basehttp.py | 11 ++++++ docs/howto/auth-remote-user.txt | 16 ++++++++ docs/releases...
null
GHSA-3c78-m682-8wp9
ChakraCore RCE Vulnerability
null
[ { "commit_message": "[PATCH] [CVE-2017-11796] Don't reset envDepths for nested compiled functions lib/Runtime/ByteCode/ByteCodeEmitter.cpp | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA2ZWJhNjNkMTg1MWI0ZWNlMWUzMzRlYTFlMDdiM2FmNDRlZjFlNDgwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQp...
null
GHSA-p5q9-86w4-2xr5
SMTP smuggling in Apache James
null
[ { "commit_message": "[PATCH] [FIX] Enforce CRLF as part of SMTP DATA transaction (#1878) .../org/apache/james/LmtpIntegrationTest.java | 26 +++++++++++++++++++ .../DataLineJamesMessageHookHandler.java | 24 +++++++++++++++++ 2 files changed, 50 insertions(+)", "patch_text_b64": "RnJvbSBkMWVmMTAyNTQwZTUw...
null
GHSA-449w-c77c-vmf6
Lack of authentication mechanism in Jenkins Git Plugin webhook
null
[ { "commit_message": "[PATCH] [SECURITY-284][SECURITY-907] README.adoc | 19 +- .../git/ApiTokenPropertyConfiguration.java | 183 ++++++++++++++++++ .../java/hudson/plugins/git/GitStatus.java | 29 ++- .../config.jelly | 54 ++++++ .../help-toke...
null
GHSA-f55g-x8qq-2569
CSV-Safe improperly filters special characters potentially leading to CSV injection
null
[ { "commit_message": "[PATCH] Improve filter on CSV formulas MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit It seems that Excel is interpreting way more than I originally thought. Fixes https://hackerone.com/reports/223999 Signed-off-by: Michal Čihař <michal@cihar.com> ...
null
GHSA-9jvx-p6mq-fw4v
pretix allows Pillow to parse EPS files
null
[ { "commit_message": "[PATCH] [SECURITY] Do not allow Pillow to parse EPS files src/pretix/api/views/order.py | 3 ++- src/pretix/base/forms/questions.py | 12 ++++-------- src/pretix/base/models/orders.py | 2 +- src/pretix/base/pdf.py | 2 +- src/pretix/base/settings.py ...
null
CVE-2025-1866
Undefined Behavior Due to Out-of-Bounds Pointer Arithmetic in libwebsockets
Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in warmcat libwebsockets allows Pointer Manipulation, potentially leading to out-of-bounds memory access. This issue affects libwebsockets before 4.3.4 and is present in code built specifically for the Win32 platform. By default, the affected code is not executed unless one of the following conditions is met: LWS_WITHOUT_EXTENSIONS (default ON) is manually set to OFF in CMake. LWS_WITH_HTTP_STREAM_COMPRESSION (default OFF) is manually set to ON in CMake. Despite these conditions, when triggered in affected configurations, this vulnerability may allow attackers to manipulate pointers, potentially leading to memory corruption or unexpected behavior.
[ { "commit_message": "[PATCH] win32port: zlib: upstream bugfix patch on inftrees.c From 6a043145ca6e9c55184013841a67b2fef87e44c0 Mon Sep 17 00:00:00 2001 [PATCH] Remove offset pointer optimization in inftrees.c. inftrees.c was subtracting an offset from a pointer to an array, in order to provide a pointer that a...
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2017-9061
In WordPress before 4.7.5, a cross-site scripting (XSS) vulnerability exists when attempting to upload very large files, because the error message does not properly restrict presentation of the filename.
[ { "commit_message": "[PATCH] Media: Simplify upload error message construction. Built from https://develop.svn.wordpress.org/trunk@40736 git-svn-id: http://core.svn.wordpress.org/trunk@40594 1a063a9b-81f0-0310-95a4-ce76da25c4cd wp-includes/js/plupload/handlers.js | 27 ++++++++++++++++--------- wp-includes/j...
n/a
CVE-2025-68148
FreshRSS globally denies access to feed via proxy modifying to 429 Retry-After
FreshRSS is a free, self-hostable RSS aggregator. From version 1.27.0 to before 1.28.0, An attacker could globally deny access to feeds via proxy modifying to 429 Retry-After for a large list of feeds on given instance, making it unusable for majority of users. This issue has been patched in version 1.28.0.
[ { "commit_message": "[PATCH] Create separate `Retry-After` files for proxies (#8029) * Create separate `Retry-After` files for proxies Bad proxies are able to send a false `Retry-After` header and affect the availability of feeds (domain-wide) for other users. This PR starts including the address of the proxy i...
CWE-770: Allocation of Resources Without Limits or Throttling
GHSA-ggj4-78rm-6xgv
baserCMS Cross-site Scripting vulnerability in File upload Feature
null
[ { "commit_message": "<gondoh@catchup.co.jp> [PATCH] Merge pull request from GHSA-ggj4-78rm-6xgv MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit * fix 【JVN#24381990】XSS vulnerability in File upload Feature * fix 【JVN#24381990】XSS vulnerability in File upload Feature 2 * ...
null
GHSA-hxp5-8pgq-mgv9
Missing Authentication for Critical Function in Apache Calcite
null
[ { "commit_message": "[PATCH] [CALCITE-4298] Avoid disabling hostname verification on HTTPS connections .../org/apache/calcite/runtime/HttpUtils.java | 17 +---------------- 1 file changed, 1 insertion(+), 16 deletions(-)", "patch_text_b64": "RnJvbSA0M2VlYWZjYmFjMjlkMDJjNzJiZDUyMGMwMDNjZGZjNTcxZGUyZDE1IE1vb...
null
GHSA-gr7h-xw4f-wh86
Sakai kernel-impl: predictable PRNG used to generate server‑side encryption key in EncryptionUtilityServiceImpl
null
[ { "commit_message": "[PATCH] SAK-49866 use commons-text for generation use SecureRandom (cherry picked from commit baea15177800d796346e94cea5db1276ad0b58ba) .../app/scheduler/jobs/cm/processor/sis/UserProcessor.java | 4 +++- .../sakaiproject/util/impl/EncryptionUtilityServiceImpl.java | 5 ++++- .../sakaiproje...
null
GHSA-5337-wcgc-wcvp
null
[ { "commit_message": "[PATCH] basic/unit-name: do not use strdupa() on a path The path may have unbounded length, for example through a fuse mount. CVE-2021-33910: attacked controlled alloca() leads to crash in systemd and ultimately a kernel panic. Systemd parses the content of /proc/self/mountinfo and each mou...
null
PYSEC-2021-499
null
[ { "commit_message": "[PATCH] Fix memory corruption issue with `tf.raw_ops.DrawBoundingBoxesV2`. PiperOrigin-RevId: 372033910 Change-Id: I8a9f4efc1c8ddaacbc26ec1fbe4bfdd6791c226d tensorflow/core/kernels/image/draw_bounding_box_op.cc | 6 ++++++ 1 file changed, 6 insertions(+)", "patch_text_b64": "RnJvbSA3OTg2...
null
GHSA-q448-6c3m-cxmj
Cross-site Scripting in jeecg-boot
null
[ { "commit_message": "[PATCH] =?UTF-8?q?=E5=8D=87=E7=BA=A7=E7=A7=AF=E6=9C=A8=E6=8A=A5?= =?UTF-8?q?=E8=A1=A8=E5=88=B0=E6=9C=80=E6=96=B0=E7=89=881.4.32=EF=BC=8C?= =?UTF-8?q?=E8=A7=A3=E5=86=B3=E4=B8=A5=E9=87=8D=E5=AE=89=E5=85=A8=E6=BC=8F?= =?UTF-8?q?=E6=B4=9E?= MIME-Version: 1.0 Content-Type: text/plain; charset=UT...
null
PYSEC-2022-288
null
[ { "commit_message": "[PATCH] FIX make sure pre_dispatch cannot do arbitrary code execution (#1321) CHANGES.rst | 4 ++++ joblib/parallel.py | 10 ++++++++-- 2 files changed, 12 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBiOTBmMTBlZmViNjcwYTJjYzg3N2ZiODhlYmIzZjIwMTkxODllMDU5IE1vbiBTZXAgMT...
null
GHSA-gf72-h4cp-wcm4
Drupal Open Social Missing Authorization vulnerability
null
[ { "commit_message": "[PATCH] When language service is not being called make sure to use the route object modules/custom/social_language/src/Access.php | 19 +++++++++++++++---- 1 file changed, 15 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSA1MmM1MzFlMTU2ZmI4NjUzZTQ3YWI5OWRmNDMyYzRmYjk2NTFmMzZlIE...
null
CVE-2022-0578
Code Injection in publify/publify
Code Injection in GitHub repository publify/publify prior to 9.2.8.
[ { "commit_message": "[PATCH] Do not allow images in comments publify_core/app/models/feedback.rb | 6 +++++- publify_core/spec/models/comment_spec.rb | 23 +++++++++++++++++++++++ 2 files changed, 28 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBiNTBkZjA1MGM1OTNjYzUzMmIyYzUxNjc5Mjk4OWJjZmNlMm...
CWE-94 Improper Control of Generation of Code
GHSA-7xr6-r55h-px6v
null
[ { "commit_message": "[PATCH] HID: cp2112: fix gpio-callback error handling In case of a zero-length report, the gpio direction_input callback would currently return success instead of an errno. Fixes: 1ffb3c40ffb5 (\"HID: cp2112: make transfer buffers DMA capable\") Cc: stable <stable@vger.kernel.org> # 4.9...
null
GHSA-8j3w-26mp-75xh
null
[ { "commit_message": "[PATCH] Fix cross-site scripting (XSS) vulnerability in handling SVG animate attributes Reported by Valentin T. and Lutz Wolf of CrowdStrike. CHANGELOG.md | 1 + program/lib/Roundcube/rcube_washtml.php | 2 +- tests/Framework/Washtml.php | 4 ++++ 3 files...
null
PYSEC-2022-43143
null
[ { "commit_message": "[PATCH] Eth account support (#361) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit * Create separate execute function * Add is_valid_eth_signature to account library * Add eth_execute to account library * Create eth account mock and test * Add missi...
null
CVE-2014-2260
Cross-site scripting (XSS) vulnerability in plugins/main/content/js/ajenti.coffee in Eugene Pankov Ajenti 1.2.13 allows remote authenticated users to inject arbitrary web script or HTML via the command field in the Cron functionality.
[ { "commit_message": "[PATCH] [ui] fixes ajenti/plugins/main/content/js/ajenti.coffee | 8 ++++++-- ajenti/plugins/main/content/js/controls.binding.coffee | 3 ++- ajenti/plugins/main/content/js/controls.inputs.coffee | 2 +- 3 files changed, 9 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvb...
n/a
PYSEC-2021-842
null
[ { "commit_message": "[PATCH 1/2] Fix tf.math.segment_max/min/mean/sun/prod crashes(aborts) when segment_ids is large This PR fixes the issue raised in 46888 where tf.math.segment_max/min/mean/sun/prod crashes(aborts) when segment_ids is large. This PR fixes 46888. Signed-off-by: Yong Tang <yong.tang.github@outl...
null
GHSA-qc5c-m97j-wqw3
null
[ { "commit_message": "[PATCH] Fix #2370 app/Support/Http/Controllers/UserNavigation.php | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA4NzE3ZjQ2OWIxMGU5ZjdlMTU0N2M2ZjcwZjdkMjRlMTM1OWQyOGQ0IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBKYW1lcyBDb2xlIDx0aGVncnVtcHlkaWN0YXRvckB...
null
GHSA-57qw-cc2g-pv5p
lxml Cross-site Scripting Via Control Characters
null
[ { "commit_message": "[PATCH 1/4] Fix: make the cleaner also remove javascript URLs that use escaping. src/lxml/html/clean.py | 5 +++-- src/lxml/html/tests/test_clean.txt | 6 +++--- 2 files changed, 6 insertions(+), 5 deletions(-)", "patch_text_b64": "RnJvbSA2YmUxZDA4MWI0OWM5N2NmZDdiM2ZiZDkzNGExO...
null
GHSA-q63q-pgmf-mxhr
Angular SSR has a Server-Side Request Forgery (SSRF) flaw
null
[ { "commit_message": "[PATCH] fix(@angular/ssr): prevent malicious URL from overriding host A request with a specially crafted URL starting with a double slash (e.g., `//example.com`) could cause the server-side rendering logic to interpret the request as being for a different host. This is due to the behavior o...
null
GHSA-c3hj-j6pp-p2f3
null
[ { "commit_message": "[PATCH] libsepol/cil: Destroy classperm list when resetting map perms Map perms share the same struct as regular perms, but only the map perms use the classperms field. This field is a pointer to a list of classperms that is created and added to when resolving classmapping rules, so the map...
null
GHSA-9fmr-q4gx-jmc2
null
[ { "commit_message": "[PATCH] [media] cxusb: Use a dma capable buffer also for reading MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Commit 17ce039b4e54 (\"[media] cxusb: don't do DMA on stack\") added a kmalloc'ed bounce buffer for writes, but missed to do the same fo...
null
CVE-2022-0766
Server-Side Request Forgery (SSRF) in janeczku/calibre-web
Server-Side Request Forgery (SSRF) in GitHub repository janeczku/calibre-web prior to 0.6.17.
[ { "commit_message": "[PATCH] Don't allow redirects on cover uploads, catch more addresses which resolve to localhost cps/helper.py | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA5NjUzNTJjOGQ5NmM5ZWFlN2E2ODY3ZmY3NmIwZGIxMzdkMDRiMGI4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9...
CWE-918 Server-Side Request Forgery (SSRF)
GHSA-hcxp-87ww-ww9m
null
[ { "commit_message": "[PATCH] Issue #1689: create unique temporary file with g_file_open_tmp(). MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Not sure this is really solving the issue reported, which is that `g_get_tmp_dir()` uses environment variables (yet as g_file_o...
null
GHSA-rjqq-98f6-6j3r
Improper Input Validation in sanitize-html
null
[ { "commit_message": "[PATCH 1/2] stop IDNA iframe attacks index.js | 23 ++++++++++++++------ test/test.js | 59 ++++++++++++++++++++++++++++++++++++++++++++++++++++ 2 files changed, 76 insertions(+), 6 deletions(-)", "patch_text_b64": "RnJvbSBjYTRiNjJhZGJmYzJiMjk1ZTcxYWQ4ZDYwZmM4YWYxMzY3ZTM4ZGFlIE1vbiBTZ...
null
GHSA-xxf6-hq9q-9r8q
null
[ { "commit_message": "[PATCH] Fix null deref in bin.symbols ##crash * Reported by cnitlrt via huntr.dev libr/bin/p/bin_symbols.c | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA1MTVlNTkyYjliZWEwNjEyYmM2M2Q4ZTkzMjM5ZmYzNWJjZjY0NWM3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOi...
null
PYSEC-2021-217
null
[ { "commit_message": "[PATCH] Validate arguments of `FractionalMaxPoolGrad` PiperOrigin-RevId: 372274982 Change-Id: If46b0c442efa4eaef635ce6a476717060420122c tensorflow/core/kernels/fractional_max_pool_op.cc | 14 ++++++++++++++ 1 file changed, 14 insertions(+)", "patch_text_b64": "RnJvbSAzMmZkY2JmZjlkMDZkMDE...
null
GHSA-rx6x-hw9j-xhm3
null
[ { "commit_message": "[PATCH] Bug 1943: Prevent loading session settings that can lead to remote code execution from handled URLs https://winscp.net/tracker/1943 (cherry picked from commit ec584f5189a856cd79509f754722a6898045c5e0) Source commit: 0f4be408b3f01132b00682da72d925d6c4ee649b source/Console.cbproj ...
null
GHSA-7p9r-9x76-5h9r
null
[ { "commit_message": "[PATCH] robust validation glob/manager_core.py | 2 +- glob/manager_server.py | 17 ++++++++++++++--- pyproject.toml | 2 +- 3 files changed, 16 insertions(+), 5 deletions(-)", "patch_text_b64": "RnJvbSBmZmMwOTVhM2U1YWNjMWM0MDQ3NzNhMDUxMGU2ZDA1NWE2YTcyYjBlIE1vbiBTZXAgMTcgMDA6MD...
null
GHSA-6h3f-43vq-53hj
Directory traversal in zenml
null
[ { "commit_message": "[PATCH] Improve Artifact Store isolation (#2490) * dir traversal issue * Auto-update of Starter template * Auto-update of NLP template * reroute artifacts and logs via AS * reroute materializers via AS * simplify to one deco * fix materializer tests * allow local download * Auto-update of E...
null
GHSA-j29f-m23h-3p8p
Cross-site Scripting in Pimcore
null
[ { "commit_message": "[PATCH] [Admin] Security - Add handler to enable Content Security Policy (#11447) * [Admin] Security - Add handler to enable Content Security Policy * [Admin] Security - Add handler to enable Content Security Policy * [Admin] Security - Add handler to enable Content Security Policy - fix do...
null
GHSA-jxfh-8wgv-vfr2
Prototype pollution in dojo
null
[ { "commit_message": "[PATCH] Merge pull request from GHSA-jxfh-8wgv-vfr2 request/util.js | 2 +- tests/unit/request/util.js | 6 ++++++ 2 files changed, 7 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAyMGEwMGFmYjY4ZjU1ODc5NDZkYzc2ZmJlYWE2OGMzOWJkYTIxNzFkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQ...
null
GHSA-g3f3-p9rc-775p
Mattermost Server exposes account details to any Team Administrator
null
[ { "commit_message": "[PATCH] PLT-2697 Fixing team admins (#2900) * PLT-2697 Fixing team admins * Fixing eslint error * Fixing loc issues * Fixing func * Fixing func api/apitestlib.go | 2 +- api/context.go | 6 +- api/team_test.go ...
null
GHSA-hq3v-rg6f-6hx4
Use of Insufficiently Random Values in yiisoft/yii2-dev
null
[ { "commit_message": "[PATCH] Fix #18817: Use `paragonie/random_compat` for random bytes and int generation composer.json | 3 +- composer.lock | 112 +++++----- framework/CHANGELOG.md | 1 + framework/base/Security.php ...
null
CVE-2022-1968
Use After Free in vim/vim
Use After Free in GitHub repository vim/vim prior to 8.2.
[ { "commit_message": "[PATCH] patch 8.2.5050: using freed memory when searching for pattern in path Problem: Using freed memory when searching for pattern in path. Solution: Make a copy of the line. src/search.c | 21 ++++++++++++++++++--- src/testdir/test_tagjump.vim | 11 +++++++++++ src/ver...
CWE-416 Use After Free
CVE-2022-1928
Cross-site Scripting (XSS) - Stored in go-gitea/gitea
Cross-site Scripting (XSS) - Stored in GitHub repository go-gitea/gitea prior to 1.16.9.
[ { "commit_message": "[PATCH] Fix raw endpoint PDF file headers (#19825) modules/typesniffer/typesniffer.go | 8 ++++++-- routers/common/repo.go | 8 ++++++-- 2 files changed, 12 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSA2NWUwNjg4YTVjOWRhY2FkNTBlNzEwMjRiNzUyOWZkZjBlM2MyZTljIE1vbiBTZ...
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-7fxx-c4v5-3v6v
null
[ { "commit_message": "[PATCH] fix \"pixel overrun\" fixes #3 ngiflib.c | 9 +++++++-- 1 file changed, 7 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBjZjQyOWUwYTJmZTI2YjVmMDFjZTBjOGU5Yjc5NDMyZTk0NTA5YjZlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBUaG9tYXMgQmVybmFyZCA8bWluaXVwbnBAZnJlZS5mcj4KRGF0ZTo...
null
GHSA-g26v-2w7v-m2qp
null
[ { "commit_message": "[PATCH] Server: Fix two issues identified by ASan 1. If the TLSPlain and X509Plain security types were both disabled, then rfbOptPamAuth() would overflow the name field in the secTypes structure when testing the \"none\" security type, since the name of that security type has less than five...
null
GHSA-76f8-p2hg-cf8g
null
[ { "commit_message": "[PATCH] Fixed allocation of large array literals. Previously, allocation of large array literals may result in null-pointer dereference. The reason is that njs_array_alloc() may return a slow array when size is large enough, but the instruction code assumes that array is always flat. The fi...
null
CVE-2014-125073
mapoor voteapp app.py show_refresh sql injection
A vulnerability was found in mapoor voteapp. It has been rated as critical. Affected by this issue is the function create_poll/do_poll/show_poll/show_refresh of the file app.py. The manipulation leads to sql injection. The patch is identified as b290c21a0d8bcdbd55db860afd3cadec97388e72. It is recommended to apply a patch to fix this issue. VDB-217790 is the identifier assigned to this vulnerability.
[ { "commit_message": "[PATCH] prevent sql injection app.py | 26 ++++++++++++-------------- templates/show.html | 11 ++++++----- 2 files changed, 18 insertions(+), 19 deletions(-)", "patch_text_b64": "RnJvbSBiMjkwYzIxYTBkOGJjZGJkNTVkYjg2MGFmZDNjYWRlYzk3Mzg4ZTcyIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpG...
CWE-89 SQL Injection
GHSA-w525-w93j-rxgm
Improper Neutralization of Input During Web Page Generation in Apache ActiveMQ
null
[ { "commit_message": "[PATCH] https://issues.apache.org/jira/browse/AMQ-6170 Fixing X-Frame-Options header so that is applied for all content served by Jetty. The previous patch wasn't correct because it only applied it to Servlets and JSPs and not static content. This also reverts AMQ-6113 (cherry picked from ...
null
GHSA-jxwm-2fgw-85f5
null
[ { "commit_message": "[PATCH] Fix UAF in `aaef` ##crash * Reported by @hdthky * Reproducer: uaf-aef * BountyID: e98ad92c-3a64-48fb-84d4-d13afdbcbdd7 libr/core/canal.c | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSA2NGE4MmUyODRkZGRhYmFlYjU0OTIyODM4MDEwM2I1N2RlYWQzMmE2...
null
CVE-2025-67897
In Sequoia before 2.1.0, aes_key_unwrap panics if passed a ciphertext that is too short. A remote attacker can take advantage of this issue to crash an application by sending a victim an encrypted message with a crafted PKESK or SKESK packet.
[ { "commit_message": "[PATCH] openpgp: Fix an underflow in aes_key_unwrap. MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit - The `aes_key_unwrap` function would panic if passed a ciphertext that was too short. In a debug build, it would panic due to a subtraction underf...
CWE-195 Signed to Unsigned Conversion Error