id stringlengths 12 19 | title stringlengths 0 237 | description stringlengths 35 3.87k ⌀ | patches listlengths 1 22 | cwe stringlengths 2 440 ⌀ |
|---|---|---|---|---|
GHSA-66gq-3g6r-6hjw | null | [
{
"commit_message": "[PATCH] Fix 1 byte oobread in the cris analysis plugin ##crash libr/anal/p/anal_cris.c | 31 ++++++++++++++++++++++--------- 1 file changed, 22 insertions(+), 9 deletions(-)",
"patch_text_b64": "RnJvbSA2MDU3ODViNjVkZDM1NmQ0NmQ0NDg3ZmFhNDFkYmY5MDk0M2I4YmMxIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwM... | null | |
GHSA-f729-58x4-gqgf | CometVisu Backend for openHAB affected by RCE through path traversal | null | [
{
"commit_message": "[PATCH] [cometvisu] Security fixes & cleanup for cometvisu backend (#2671) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit add required authentication for some rest endpoints, add some sanity checks to improve security. Remove code that has been ma... | null |
CVE-2026-21440 | AdonisJS Path Traversal in Multipart File Handling | AdonisJS is a TypeScript-first web framework. A Path Traversal vulnerability in AdonisJS multipart file handling may allow a remote attacker to write arbitrary files to arbitrary locations on the server filesystem. This impacts @adonisjs/bodyparser through version 10.1.1 and 11.x prerelease versions prior to 11.0.0-next.6. This issue has been patched in @adonisjs/bodyparser versions 10.1.2 and 11.0.0-next.6. | [
{
"commit_message": "[PATCH] fix: always generate a random filename when performing move operation src/bodyparser_middleware.ts | 3 ++- src/multipart/file.ts | 6 +++++- tests/body_parser.spec.ts | 10 +++++++--- 3 files changed, 14 insertions(+), 5 deletions(-)",
"patch_text_b64": "RnJvbSAxNDNhMT... | CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') |
GHSA-qgfr-5hqp-vrw9 | Path Traversal in decompress | null | [
{
"commit_message": "[PATCH] Prevent directory traversal (#73) .travis.yml | 6 +-- fixtures/edge_case_dots.tar.gz | Bin 0 -> 318 bytes fixtures/slip.zip | Bin 0 -> 1953 bytes fixtures/slip2.zip | Bin 0 -> 1948 bytes fixtures/slip3.zip ... | null |
CVE-2024-12797 | RFC7250 handshakes with unauthenticated servers don't abort as expected | Issue summary: Clients using RFC7250 Raw Public Keys (RPKs) to authenticate a
server may fail to notice that the server was not authenticated, because
handshakes don't abort as expected when the SSL_VERIFY_PEER verification mode
is set.
Impact summary: TLS and DTLS connections using raw public keys may be
vulnerable to man-in-middle attacks when server authentication failure is not
detected by clients.
RPKs are disabled by default in both TLS clients and TLS servers. The issue
only arises when TLS clients explicitly enable RPK use by the server, and the
server, likewise, enables sending of an RPK instead of an X.509 certificate
chain. The affected clients are those that then rely on the handshake to
fail when the server's RPK fails to match one of the expected public keys,
by setting the verification mode to SSL_VERIFY_PEER.
Clients that enable server-side raw public keys can still find out that raw
public key verification failed by calling SSL_get_verify_result(), and those
that do, and take appropriate action, are not affected. This issue was
introduced in the initial implementation of RPK support in OpenSSL 3.2.
The FIPS modules in 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue. | [
{
"commit_message": "[PATCH] With SSL_VERIFY_PEER client RPK should abort on X509 error While RPK performs X.509 checks correctly, at the SSL layer the SSL_VERIFY_PEER flag was not honoured and connections were allowed to complete even when the server was not verified. The client can of course determine this b... | CWE-392 Missing Report of Error Condition |
CVE-2021-26911 | core/imap/MCIMAPSession.cpp in Canary Mail before 3.22 has Missing SSL Certificate Validation for IMAP in STARTTLS mode. | [
{
"commit_message": "[PATCH] [Core] Check Start/TLS cert src/core/imap/MCIMAPSession.cpp | 7 +++++++ 1 file changed, 7 insertions(+)",
"patch_text_b64": "RnJvbSA0NWFjYjRlZmJjYWE1N2EyMGFjNTEyN2RjOTc2NTM4NjcxZmNlMDE4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBEZXYgU2FuZ2hhbmkgPGRldnNhbmdoYW5pQGdtYWlsLmNvbT4KRG... | n/a | |
GHSA-qhfv-w8w8-3r26 | null | [
{
"commit_message": "[PATCH] powerpc/tm: Block signal return setting invalid MSR state Currently we allow both the MSR T and S bits to be set by userspace on a signal return. Unfortunately this is a reserved configuration and will cause a TM Bad Thing exception if attempted (via rfid). This patch checks for th... | null | |
PYSEC-2018-7 | null | [
{
"commit_message": "[PATCH] Security: prevent timing attack on WEBHOOK_AUTHORIZATION secret Anymail's webhook validation was vulnerable to a timing attack. An attacker could have used this to recover your WEBHOOK_AUTHORIZATION shared secret, potentially allowing them to post fabricated or malicious email track... | null | |
GHSA-6h67-934r-82g7 | Bypass of field access control in strapi-plugin-protected-populate | null | [
{
"commit_message": "[PATCH] fix fields always populating ID server/middlewares/helpers/protect-route.js | 11 ++++++----- 1 file changed, 6 insertions(+), 5 deletions(-)",
"patch_text_b64": "RnJvbSAwNTQ0MTA2NmQ2NGUwOWRkNTU5MzdkOWYwODk5NjJlOWViZTJmYjM5IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBCb2VnaWUxOSA8Q... | null |
CVE-2025-46339 | FreshRSS vulnerable to favicon cache poisoning via proxy | FreshRSS is a self-hosted RSS feed aggregator. Prior to version 1.26.2, it's possible to poison feed favicons by adding a given URL as a feed with the proxy set to an attacker-controlled one and disabled SSL verifying. The favicon hash is computed by hashing the feed URL and the salt, whilst not including the following variables: proxy address, proxy protocol, and whether SSL should be verified. Therefore it's possible to poison a favicon of a given feed by simply intercepting the response of the feed, and changing the website URL to one where a threat actor controls the feed favicon. Feed favicons can be replaced for all users by anyone. Version 1.26.2 fixes the issue. | [
{
"commit_message": "[PATCH] Improve favicon hash (#7505) * Favicon hash proxy Content provided through a proxy may be completely different, so the feed hash must account for that * Fix typing * Hash of Web site in priority for favicons * Continue * Revert some minor changes app/Models/Feed.php | 56 +++++++++++... | CWE-349: Acceptance of Extraneous Untrusted Data With Trusted Data |
CVE-2017-7895 | The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lack certain checks for the end of a buffer, which allows remote attackers to trigger pointer-arithmetic errors or possibly have unspecified other impact via crafted requests, related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c. | [
{
"commit_message": "[PATCH] nfsd: stricter decoding of write-like NFSv2/v3 ops MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit The NFSv2/v3 code does not systematically check whether we decode past the end of the buffer. This generally appears to be harmless, but ther... | n/a | |
PYSEC-2021-538 | null | [
{
"commit_message": "[PATCH] Fix the CHECK failure in tf.raw_ops.QuantizeAndDequantizeV2. PiperOrigin-RevId: 371361603 Change-Id: Ia70e34d41adaadddf928e95e5e5c5c97d5bc60d0 tensorflow/core/kernels/quantize_and_dequantize_op.cc | 3 +++ 1 file changed, 3 insertions(+)",
"patch_text_b64": "RnJvbSBjNWIwZDVmOGFjM... | null | |
GHSA-hpmv-wvq3-gj27 | Moodle cross-site request forgery (CSRF) vulnerability | null | [
{
"commit_message": "[PATCH] MDL-51091 core_registration: session key check in registration. admin/registration/register.php | 2 ++ admin/settings/top.php | 2 +- 2 files changed, 3 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSA0YmI5ZTFhZDhhZjEyYjAxNDk5YzY4NTQzZTgwZjdjMTJmZDU1N2VhIE1vbiBT... | null |
CVE-2023-4752 | Use After Free in vim/vim | Use After Free in GitHub repository vim/vim prior to 9.0.1858. | [
{
"commit_message": "[PATCH] patch 9.0.1858: [security] heap use after free in ins_compl_get_exp() Problem: heap use after free in ins_compl_get_exp() Solution: validate buffer before accessing it Signed-off-by: Christian Brabandt <cb@256bit.org> src/insexpand.c | 2 +- src/testdir/crash/poc_... | CWE-416 Use After Free |
CVE-2020-36281 | Leptonica before 1.80.0 allows a heap-based buffer over-read in pixFewColorsOctcubeQuantMixed in colorquant1.c. | [
{
"commit_message": "[PATCH] Fixed issue 22140 in oss-fuzz: Heap-buffer-overflow * color quantized pix must be 8 bpp before extra colors are added. src/colorquant1.c | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSA1ZWUyNGIzOThiYjY3NjY2ZjZkMTczNzYzZWFhZWRkOWMzNmZiMWU1IE... | n/a | |
CVE-2024-43411 | CKEditor4 has a low risk cross-site scripting (XSS) vulnerability from domain takeover | CKEditor4 is an open source what-you-see-is-what-you-get HTML editor. A theoretical vulnerability has been identified in CKEditor 4.22 (and above). In a highly unlikely scenario where an attacker gains control over the https://cke4.ckeditor.com domain, they could potentially execute an attack on CKEditor 4 instances. The issue impacts only editor instances with enabled version notifications. Please note that this feature is disabled by default in all CKEditor 4 LTS versions. Therefore, if you use CKEditor 4 LTS, it is highly unlikely that you are affected by this vulnerability. If you are unsure, please contact us. The fix is available in version 4.25.0-lts. | [
{
"commit_message": "[PATCH 1/3] Update version-check core/ckeditor_version-check.js | 13 +++++++++---- 1 file changed, 9 insertions(+), 4 deletions(-)",
"patch_text_b64": "RnJvbSBhMjllNGZkNTkwNGRhNWYyZDI5ZGM3N2RhOWJhYWM3NmExNGNhMjY2IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBLYXJvbERhd2lkeml1ayA8a2FybDE5OTU... | CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
CVE-2020-21219 | Cross Site Scripting (XSS) vulnerability in Netgate pf Sense 2.4.4-Release-p3 and Netgate ACME package 0.6.3 allows remote attackers to to run arbitrary code via the RootFolder field to acme_certificate_edit.php page of the ACME package. | [
{
"commit_message": "[PATCH] Prevent ACME output from being interpreted as HTML. Fixes #9888 security/pfSense-pkg-acme/Makefile | 1 + .../pfSense-pkg-acme/files/usr/local/pkg/acme/acme_sh.inc | 2 +- .../files/usr/local/www/acme/acme_accountkeys.php | 4 ++-- .../files/u... | n/a | |
CVE-2019-25050 | netCDF in GDAL 2.4.2 through 3.0.4 has a stack-based buffer overflow in nc4_get_att (called from nc4_get_att_tc and nc_get_att_text) and in uffd_cleanup (called from netCDFDataset::~netCDFDataset and netCDFDataset::~netCDFDataset). | [
{
"commit_message": "[PATCH] netCDF: avoid buffer overflow. master only. Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15143. Credit to OSS Fuzz gdal/frmts/netcdf/netcdfsg.cpp | 15 +++++---------- 1 file changed, 5 insertions(+), 10 deletions(-)",
"patch_text_b64": "RnJvbSA3NjdlM2E1NjE0NGY2NzZ... | n/a | |
CVE-2022-25882 | Versions of the package onnx before 1.13.0 are vulnerable to Directory Traversal as the external_data field of the tensor proto can have a path to the file which is outside the model current directory or user-provided directory, for example "../../../etc/passwd" | [
{
"commit_message": "[PATCH] Do not allow to read tensor's external_data outside the model directory (#4400) * Not allow to read tensor external_data outside the model directory Signed-off-by: jnovikov <johnnovikov0@gmail.com> * Fix formatting errors Signed-off-by: jnovikov <johnnovikov0@gmail.com> * Disable se... | Directory Traversal | |
CVE-2024-53866 | pnpm vulnerable to no-script global cache poisoning via overrides / `ignore-scripts` evasion | The package manager pnpm prior to version 9.15.0 seems to mishandle overrides and global cache: Overrides from one workspace leak into npm metadata saved in global cache; npm metadata from global cache affects other workspaces; and installs by default don't revalidate the data (including on first lockfile generation). This can make workspace A (even running with `ignore-scripts=true`) posion global cache and execute scripts in workspace B. Users generally expect `ignore-scripts` to be sufficient to prevent immediate code execution on install (e.g. when the tree is just repacked/bundled without executing it). Here, that expectation is broken. Global state integrity is lost via operations that one would expect to be secure, enabling subsequently running arbitrary code execution on installs. Version 9.15.0 fixes the issue. As a work-around, use separate cache and store dirs in each workspace. | [
{
"commit_message": "[PATCH] Merge commit from fork .changeset/silent-wombats-roll.md | 6 ++++++ resolving/npm-resolver/src/pickPackage.ts | 8 +++++--- resolving/npm-resolver/test/index.ts | 21 +++++++++++++++++++++ 3 files changed, 32 insertions(+), 3 deletions(-) create mode 100644 .changeset/s... | CWE-426: Untrusted Search Path |
GHSA-ppv3-px64-q9mx | null | [
{
"commit_message": "[PATCH] Fix fido2 signature validation bug src/scheme/webauthn.c | 9 ++++++++- 1 file changed, 8 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSAwZWZkMTEyYmI2MmY1NjY4Nzc3NTBhZDYyZWU4MjhiZmY1NzliNGUyIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBiYWJlbG91ZXN0IDxnaXRodWJAYmFiZWxvdWVz... | null | |
GHSA-hff2-x2j9-gxgv | Keylime: unhandled exceptions could lead to invalid attestation states | null | [
{
"commit_message": "[PATCH] Fix proper exception handling and impedance match in `tornado_requests` (#1128) * Proper exception handling in tornado_requests Signed-off-by: George Almasi <gheorghe@us.ibm.com> Co-authored-by: George Almasi <gheorghe@us.ibm.com> keylime/tornado_requests.py | 5 +++-- 1 file changed... | null |
GHSA-pgvc-6h2p-q4f6 | Umbraco CMS disclosure of configured password requirements | null | [
{
"commit_message": "[PATCH] Merge commit from fork .../Controllers/AuthenticationController.cs | 19 +++++++++++++++---- .../Controllers/BackOfficeController.cs | 5 +++++ .../Extensions/HttpContextExtensions.cs | 11 +++++++++++ 3 files changed, 31 insertions(+), 4 deletions(-)",
"patch_text_b... | null |
GHSA-p9jm-j7j3-qc5g | null | [
{
"commit_message": "[PATCH] fix: for issue #584 fuel/modules/fuel/controllers/Login.php | 40 +++++++++++++++---- .../fuel/language/english/fuel_lang.php | 1 + 2 files changed, 34 insertions(+), 7 deletions(-)",
"patch_text_b64": "RnJvbSA2MTY0Y2Q3OTQ2NzRkNGQ3NGRhMzlmOGI1MzVmZjU4OGFiMDA2ZTMzIE1v... | null | |
GHSA-p2pf-g8cq-3gq5 | teler-waf contains detection rule bypass via Entities payload | null | [
{
"commit_message": "[PATCH] feat: Added case-insensitivity detects the IE octal/hex/unicode entities Modified the regular expression rule for handling escape characters by adding the case-insensitive `(?i)` flag to the rule. This change ensures that the regular expression will match escape characters regardles... | null |
CVE-2024-28860 | Insecure IPsec transport encryption in Cilium | Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Users of IPsec transparent encryption in Cilium may be vulnerable to cryptographic attacks that render the transparent encryption ineffective. In particular, Cilium is vulnerable to chosen plaintext, key recovery, replay attacks by a man-in-the-middle attacker. These attacks are possible due to an ESP sequence number collision when multiple nodes are configured with the same key. Fixed versions of Cilium use unique keys for each IPsec tunnel established between nodes, resolving all of the above attacks. This vulnerability is fixed in 1.13.13, 1.14.9, and 1.15.3. | [
{
"commit_message": "[PATCH] ipsec: fix per-node-pair-key computation MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit This commit ensures that - each time we compute a per-node-pair-key we create an empty slice with the correct length first, and then append all the inpu... | CWE-326: Inadequate Encryption Strength |
CVE-2025-53945 | apko has incorrect permission (0666) in /etc/ld.so.cache and other files | apko allows users to build and publish OCI container images built from apk packages. Starting in version 0.27.0 and prior to version 0.29.5, critical files were inadvertently set to 0666, which could likely be abused for root escalation. Version 0.29.5 contains a fix for the issue. | [
{
"commit_message": "[PATCH] generate /etc/ld.so.cache (#1629) `/etc/ld.so.cache` is a cache file of all of the public shared libraries on the system. At runtime, the linker looks for libraries here first before falling back to searching a built-in list of directories (`/lib`, `/usr/lib`, `/usr/local/lib`, etc ... | CWE-276: Incorrect Default Permissions |
GHSA-hg37-8m7v-x2rc | null | [
{
"commit_message": "[PATCH] fscrypt: remove broken support for detecting keyring key revocation Filesystem encryption ostensibly supported revoking a keyring key that had been used to \"unlock\" encrypted files, causing those files to become \"locked\" again. This was, however, buggy for several reasons, the ... | null | |
CVE-2022-31006 | Hyperledger Indy DOS vulnerability | indy-node is the server portion of Hyperledger Indy, a distributed ledger purpose-built for decentralized identity. In vulnerable versions of indy-node, an attacker can max out the number of client connections allowed by the ledger, leaving the ledger unable to be used for its intended purpose. However, the ledger content will not be impacted and the ledger will resume functioning after the attack. This attack exploits the trade-off between resilience and availability. Any protection against abusive client connections will also prevent the network being accessed by certain legitimate users. As a result, validator nodes must tune their firewall rules to ensure the right trade-off for their network's expected users. The guidance to network operators for the use of firewall rules in the deployment of Indy networks has been modified to better protect against denial of service attacks by increasing the cost and complexity in mounting such attacks. The mitigation for this vulnerability is not in the Hyperledger Indy code per se, but rather in the individual deployments of Indy. The mitigations should be applied to all deployments of Indy, and are not related to a particular release. | [
{
"commit_message": "[PATCH 1/5] Update setup_iptables script - Retain overall connection limit - Limit the number of connections per IP address - Rate limit the connections per IP address. - Add support for deleting (-d) the rules added by the script. - Update usage and warning documentation. Signed-off-by: Wa... | CWE-400: Uncontrolled Resource Consumption |
GHSA-hfg3-f7fm-c9xc | null | [
{
"commit_message": "[PATCH] axohelp 1.3 git-svn-id: svn://tug.org/texlive/trunk/Build/source@52042 c570f23f-e606-0410-a88d-b1316a301751 utils/axodraw2/ChangeLog | 5 + utils/axodraw2/TLpatches/TL-Changes | 3 +- utils/axodraw2/axodraw2-src/ChangeLog | 5 + utils/axodraw2/... | null | |
PYSEC-2024-162 | null | [
{
"commit_message": "[PATCH 01/18] Set an arbitrary upper limit on ReDoS-vulnerable regexps docs/news.rst | 28 ++++++++++++++++++++++++++++ scrapy/utils/iterators.py | 12 +++++++----- scrapy/utils/response.py | 4 ++-- 3 files changed, 37 insertions(+), 7 deletions(-)",
"patch_text_b64": "RnJvb... | null | |
CVE-2023-33970 | Missing access control in internal task links feature in Kanboard | Kanboard is open source project management software that focuses on the Kanban methodology. A vulnerability related to a `missing access control` was found, which allows a User with the lowest privileges to leak all the tasks and projects titles within the software, even if they are not invited or it's a personal project. This could also lead to private/critical information being leaked if such information is in the title. This issue has been addressed in version 1.2.30. Users are advised to upgrade. There are no known workarounds for this vulnerability.
| [
{
"commit_message": "[PATCH] Add missing permission check when creating/updating internal links app/Api/Procedure/TaskLinkProcedure.php | 18 ++++++++++++++++++ app/Controller/TaskInternalLinkController.php | 13 +++++++++++++ 2 files changed, 31 insertions(+)",
"patch_text_b64": "RnJvbSBiNTAxZWY0NGJjMj... | CWE-862: Missing Authorization |
GHSA-9jgg-88mc-972h | webpack-dev-server users' source code may be stolen when they access a malicious web site with non-Chromium based browser | null | [
{
"commit_message": "[PATCH] Merge commit from fork BREAKING CHANGE: cross origin requests are not allowed unless allowed by `Access-Control-Allow-Origin` header lib/Server.js | 26 ++++++ test/e2e/cross-origin-request.test.js | 118 ++++++++++++++++++++++++++ test/ports-map.js ... | null |
GHSA-qg36-9jxh-fj25 | Incorrect signature verification in django-ses | null | [
{
"commit_message": "[PATCH] Restrict amazonaws allowed certificate URLs. django_ses/utils.py | 82 +++++++++++++++++++++++++++------------------ 1 file changed, 50 insertions(+), 32 deletions(-)",
"patch_text_b64": "RnJvbSBiNzFiNWY0MTMyOTNhMTM5OTdiNmU2MzE0MDg2Y2I5YzIyNjI5Nzk1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAw... | null |
GHSA-xc7w-jvhx-p6q9 | Cobbler Path Traversal vulnerability | null | [
{
"commit_message": "[PATCH] Add strict kickstart check in the API, again should fix #939. cobbler/remote.py | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSA4MjMyYzBlODhlYzczODJkM2Y4ZDNiZjQ4YzgxYTRhOTFhYzQzMjVkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiA9P1VURi04P3E/Sj1D... | null |
GHSA-2w7f-f8wc-vhx7 | null | [
{
"commit_message": "[PATCH] Update README.md README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSBhN2YyMmExMzNjMTg4ZDIxZDU1MzJmZDBlZWUyM2QxNzcxYTBlNTg2IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBTYWlmZWRkaW5lIEFMT1VJIDxhbG91aS5zZWlmZWRkaW5lQGdtYWlsLmNvbT4KRGF0ZTogVGh1LC... | null | |
GHSA-v7w9-63xh-6r3w | LibreNMS has a Reflected XSS ('Cross-site Scripting') in librenms/includes/functions.php | null | [
{
"commit_message": "[PATCH] Fix xss in report_this (#16613) https://github.com/librenms/librenms/security/advisories/GHSA-v7w9-63xh-6r3w includes/functions.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSA2YTE0YTliZDc2N2M2ZTQ1MmU0ZGY3N2EyNDEyNmMzZWViOTNkY2JmIE1vbiBTZXAgM... | null |
CVE-2017-13045 | The VQP parser in tcpdump before 4.9.2 has a buffer over-read in print-vqp.c:vqp_print(). | [
{
"commit_message": "[PATCH] CVE-2017-13045/VQP: add some bounds checks This fixes a buffer over-read discovered by Bhargava Shastry, SecT/TU Berlin. Add a test using the capture file supplied by the reporter(s). print-vqp.c | 14 +++++++++++++- tests/TESTLIST | 1 + tests/vqp-oobr.out | 4 ++++... | n/a | |
CVE-2020-15236 | Directory Traversal in Wiki.js | In Wiki.js before version 2.5.151, directory traversal outside of Wiki.js context is possible when a storage module with local asset cache fetching is enabled. A malicious user can potentially read any file on the file system by crafting a special URL that allows for directory traversal. This is only possible when a storage module implementing local asset cache (e.g Local File System or Git) is enabled and that no web application firewall solution (e.g. cloudflare) strips potentially malicious URLs. Commit 084dcd69d1591586ee4752101e675d5f0ac6dcdc fixes this vulnerability by sanitizing the path before it is passed on to the storage module. The sanitization step removes any directory traversal (e.g. `..` and `.`) sequences as well as invalid filesystem characters from the path. As a workaround, disable any storage module with local asset caching capabilities such as Local File System and Git. | [
{
"commit_message": "[PATCH] fix: strip directory traversal sequences from asset paths server/helpers/page.js | 10 ++++++++-- 1 file changed, 8 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSAwODRkY2Q2OWQxNTkxNTg2ZWU0NzUyMTAxZTY3NWQ1ZjBhYzZkY2RjIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBOR1BpeGVsI... | {"CWE-22":"Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"} |
CVE-2020-35848 | Agentejo Cockpit before 0.11.2 allows NoSQL injection via the Controller/Auth.php newpassword function. | [
{
"commit_message": "[PATCH] fix possible security issue for login modules/Cockpit/Controller/Auth.php | 18 +++++++++++++++++- 1 file changed, 17 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSA3OWZjOTYzMWZmYTI5MTQ2ZTMxMjRjZWFmOTk4NzliOTJlMWVmMjRiIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBcnR1ciBI... | n/a | |
CVE-2007-10002 | web-cyradm auth.inc.php sql injection | A vulnerability, which was classified as critical, has been found in web-cyradm. Affected by this issue is some unknown functionality of the file auth.inc.php. The manipulation of the argument login/login_password/LANG leads to sql injection. The attack may be launched remotely. The name of the patch is 2bcbead3bdb5f118bf2c38c541eaa73c29dcc90f. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217640. | [
{
"commit_message": "[PATCH] Prevention of SQL injection auth.inc.php | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-)",
"patch_text_b64": "RnJvbSAyYmNiZWFkM2JkYjVmMTE4YmYyYzM4YzU0MWVhYTczYzI5ZGNjOTBmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBsdWMgPGx1Y0AxYjUzYTEzZS0wODE5LTA0MTAtOGZjMi1jZjM3NmZlNj... | CWE-89 SQL Injection |
CVE-2022-35989 | `CHECK` fail in `MaxPool` in TensorFlow | TensorFlow is an open source platform for machine learning. When `MaxPool` receives a window size input array `ksize` with dimensions greater than its input tensor `input`, the GPU kernel gives a `CHECK` fail that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 32d7bd3defd134f21a4e344c8dfd40099aaf6b18. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue. | [
{
"commit_message": "[PATCH] Fix MaxPool crash on GPU for invalid filter size. If the filter size exceeds the input size by one for `VALID` padding, return an empty tensor. This is consistent with XLA. PiperOrigin-RevId: 462684864 tensorflow/core/kernels/maxpooling_op.cc | 7 +++++++ .../python/kern... | CWE-617: Reachable Assertion |
GHSA-737w-mh58-cxjp | Arbitrary code execution in Apache Struts | null | [
{
"commit_message": "[PATCH] Disable eval expressions git-svn-id: https://svn.apache.org/repos/asf/struts/struts2/branches/STRUTS_2_3_14_X@1469249 13f79535-47bb-0310-9956-ffa450edef68 .../org/apache/struts2/StrutsConstants.java | 3 ++ .../struts2/config/BeanSelectionProvider.java | 1 + .../opensymphony/xwor... | null |
CVE-2023-4007 | Cross-site Scripting (XSS) - Stored in thorsten/phpmyfaq | Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.16. | [
{
"commit_message": "[PATCH] fix: added missing conversion to HTML entities phpmyfaq/src/phpMyFAQ/Link.php | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-)",
"patch_text_b64": "RnJvbSA0MGViOTY4NTE5ODEyODkwOGU4M2MyYmVmNGMyMjg3NTFmZDQzYTBlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBUaG9yc3RlbiBSaW5... | CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
GHSA-vwj8-4grf-3r8v | Liferay Portal and Liferay DXP fails to invalidate password reset tokens after use | null | [
{
"commit_message": "[PATCH] LPS-108642 Once change the password, we need to invalidate the password reset link .../service/impl/UserLocalServiceImpl.java | 25 ++++++++++++++++++- 1 file changed, 24 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSA4ZjA3MmVlODUyN2ExZGQ1YzBmZmE5MWM0YTc4NjQxZDBlNjY2... | null |
PYSEC-2021-417 | null | [
{
"commit_message": "[PATCH] Prevent unitialized variable use in grappler. PiperOrigin-RevId: 399702928 Change-Id: Id7e75451fbff297692dfb687f60ea04b25c96b24 .../core/grappler/optimizers/auto_parallel.cc | 2 +- .../grappler/optimizers/auto_parallel_test.cc | 24 +++++++++++++++++++ 2 files changed, 25 insertions... | null | |
CVE-2023-50252 | php-svg-lib unsafe attributes merge when parsing `use` tag | php-svg-lib is an SVG file parsing / rendering library. Prior to version 0.5.1, when handling `<use>` tag that references an `<image>` tag, it merges the attributes from the `<use>` tag to the `<image>` tag. The problem pops up especially when the `href` attribute from the `<use>` tag has not been sanitized. This can lead to an unsafe file read that can cause PHAR Deserialization vulnerability in PHP prior to version 8. Version 0.5.1 contains a patch for this issue. | [
{
"commit_message": "[PATCH] Do not merge additional USE element attributes src/Svg/Tag/UseTag.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSAwOGNlNmE5NmQ2M2FkNzIxNjMxNWZhZTM0YTYxYzg4NmRkMmRjMDMwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBCcmlhbiBTd2VlbmV5IDxic3dlZW5leUB... | CWE-15: External Control of System or Configuration Setting |
GHSA-r5jw-62xg-j433 | Cross-Site Scripting in Kaminari | null | [
{
"commit_message": "[PATCH] Blacklist \"original_script_name\" get param kaminari-core/lib/kaminari/helpers/tags.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSA4ZGQ1MmExYWVkM2QyZmEyODM1ZDgzNmRlMjNmYzBkOGM0ZmY1ZGI4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBEYW5pZWwgTWlyY... | null |
CVE-2015-3185 | The ap_some_auth_required function in server/request.c in the Apache HTTP Server 2.4.x before 2.4.14 does not consider that a Require directive may be associated with an authorization setting rather than an authentication setting, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging the presence of a module that relies on the 2.2 API behavior. | [
{
"commit_message": "[PATCH] SECURITY: CVE-2015-3183 (cve.mitre.org) Replacement of ap_some_auth_required (unusable in Apache httpd 2.4) with new ap_some_authn_required and ap_force_authn hook. Submitted by: breser git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1684524 13f79535-47bb-0310-9956-ff... | n/a | |
PYSEC-2025-43 | null | [
{
"commit_message": "[PATCH] [Security] Fix image hash collision (#17378) Signed-off-by: DarkLight1337 <tlleungac@connect.ust.hk> tests/multimodal/assets/image1.png | Bin 0 -> 1837 bytes tests/multimodal/assets/image2.png | Bin 0 -> 1837 bytes tests/multimodal/test_hasher.py | 61 +++++++++++++++++++++++++++... | null | |
GHSA-r2f7-w5vx-9jgx | null | [
{
"commit_message": "[PATCH] =?UTF-8?q?=E4=BF=AE=E5=A4=8D=E5=88=87=E6=8D=A2=E8=AF=AD?= =?UTF-8?q?=E8=A8=80=E9=87=8D=E5=AE=9A=E5=90=91=E9=A1=B5=E9=9D=A2=E5=8F=AF?= =?UTF-8?q?=E8=A2=AB=E7=94=A8=E6=88=B7=E6=8E=A7=E5=88=B6=E7=9A=84=E6=BC=8F?= =?UTF-8?q?=E6=B4=9E?= MIME-Version: 1.0 Content-Type: text/plain; charset... | null | |
GHSA-7qfw-j7hp-v45g | Django WSGI Header Spoofing Vulnerability | null | [
{
"commit_message": "[PATCH] [1.7.x] Stripped headers containing underscores to prevent spoofing in WSGI environ. This is a security fix. Disclosure following shortly. Thanks to Jedediah Smith for the report. django/core/servers/basehttp.py | 11 ++++++ docs/howto/auth-remote-user.txt | 16 ++++++++ docs/releases... | null |
GHSA-3c78-m682-8wp9 | ChakraCore RCE Vulnerability | null | [
{
"commit_message": "[PATCH] [CVE-2017-11796] Don't reset envDepths for nested compiled functions lib/Runtime/ByteCode/ByteCodeEmitter.cpp | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSA2ZWJhNjNkMTg1MWI0ZWNlMWUzMzRlYTFlMDdiM2FmNDRlZjFlNDgwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQp... | null |
GHSA-p5q9-86w4-2xr5 | SMTP smuggling in Apache James | null | [
{
"commit_message": "[PATCH] [FIX] Enforce CRLF as part of SMTP DATA transaction (#1878) .../org/apache/james/LmtpIntegrationTest.java | 26 +++++++++++++++++++ .../DataLineJamesMessageHookHandler.java | 24 +++++++++++++++++ 2 files changed, 50 insertions(+)",
"patch_text_b64": "RnJvbSBkMWVmMTAyNTQwZTUw... | null |
GHSA-449w-c77c-vmf6 | Lack of authentication mechanism in Jenkins Git Plugin webhook | null | [
{
"commit_message": "[PATCH] [SECURITY-284][SECURITY-907] README.adoc | 19 +- .../git/ApiTokenPropertyConfiguration.java | 183 ++++++++++++++++++ .../java/hudson/plugins/git/GitStatus.java | 29 ++- .../config.jelly | 54 ++++++ .../help-toke... | null |
GHSA-f55g-x8qq-2569 | CSV-Safe improperly filters special characters potentially leading to CSV injection | null | [
{
"commit_message": "[PATCH] Improve filter on CSV formulas MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit It seems that Excel is interpreting way more than I originally thought. Fixes https://hackerone.com/reports/223999 Signed-off-by: Michal Čihař <michal@cihar.com> ... | null |
GHSA-9jvx-p6mq-fw4v | pretix allows Pillow to parse EPS files | null | [
{
"commit_message": "[PATCH] [SECURITY] Do not allow Pillow to parse EPS files src/pretix/api/views/order.py | 3 ++- src/pretix/base/forms/questions.py | 12 ++++-------- src/pretix/base/models/orders.py | 2 +- src/pretix/base/pdf.py | 2 +- src/pretix/base/settings.py ... | null |
CVE-2025-1866 | Undefined Behavior Due to Out-of-Bounds Pointer Arithmetic in libwebsockets | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in warmcat libwebsockets allows Pointer Manipulation, potentially leading to out-of-bounds memory access. This issue affects libwebsockets before 4.3.4 and is present in code built specifically for the Win32 platform.
By default, the affected code is not executed unless one of the following conditions is met:
LWS_WITHOUT_EXTENSIONS (default ON) is manually set to OFF in CMake.
LWS_WITH_HTTP_STREAM_COMPRESSION (default OFF) is manually set to ON in CMake.
Despite these conditions, when triggered in affected configurations, this vulnerability may allow attackers to manipulate pointers, potentially leading to memory corruption or unexpected behavior. | [
{
"commit_message": "[PATCH] win32port: zlib: upstream bugfix patch on inftrees.c From 6a043145ca6e9c55184013841a67b2fef87e44c0 Mon Sep 17 00:00:00 2001 [PATCH] Remove offset pointer optimization in inftrees.c. inftrees.c was subtracting an offset from a pointer to an array, in order to provide a pointer that a... | CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer |
CVE-2017-9061 | In WordPress before 4.7.5, a cross-site scripting (XSS) vulnerability exists when attempting to upload very large files, because the error message does not properly restrict presentation of the filename. | [
{
"commit_message": "[PATCH] Media: Simplify upload error message construction. Built from https://develop.svn.wordpress.org/trunk@40736 git-svn-id: http://core.svn.wordpress.org/trunk@40594 1a063a9b-81f0-0310-95a4-ce76da25c4cd wp-includes/js/plupload/handlers.js | 27 ++++++++++++++++--------- wp-includes/j... | n/a | |
CVE-2025-68148 | FreshRSS globally denies access to feed via proxy modifying to 429 Retry-After | FreshRSS is a free, self-hostable RSS aggregator. From version 1.27.0 to before 1.28.0, An attacker could globally deny access to feeds via proxy modifying to 429 Retry-After for a large list of feeds on given instance, making it unusable for majority of users. This issue has been patched in version 1.28.0. | [
{
"commit_message": "[PATCH] Create separate `Retry-After` files for proxies (#8029) * Create separate `Retry-After` files for proxies Bad proxies are able to send a false `Retry-After` header and affect the availability of feeds (domain-wide) for other users. This PR starts including the address of the proxy i... | CWE-770: Allocation of Resources Without Limits or Throttling |
GHSA-ggj4-78rm-6xgv | baserCMS Cross-site Scripting vulnerability in File upload Feature | null | [
{
"commit_message": "<gondoh@catchup.co.jp> [PATCH] Merge pull request from GHSA-ggj4-78rm-6xgv MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit * fix 【JVN#24381990】XSS vulnerability in File upload Feature * fix 【JVN#24381990】XSS vulnerability in File upload Feature 2 * ... | null |
GHSA-hxp5-8pgq-mgv9 | Missing Authentication for Critical Function in Apache Calcite | null | [
{
"commit_message": "[PATCH] [CALCITE-4298] Avoid disabling hostname verification on HTTPS connections .../org/apache/calcite/runtime/HttpUtils.java | 17 +---------------- 1 file changed, 1 insertion(+), 16 deletions(-)",
"patch_text_b64": "RnJvbSA0M2VlYWZjYmFjMjlkMDJjNzJiZDUyMGMwMDNjZGZjNTcxZGUyZDE1IE1vb... | null |
GHSA-gr7h-xw4f-wh86 | Sakai kernel-impl: predictable PRNG used to generate server‑side encryption key in EncryptionUtilityServiceImpl | null | [
{
"commit_message": "[PATCH] SAK-49866 use commons-text for generation use SecureRandom (cherry picked from commit baea15177800d796346e94cea5db1276ad0b58ba) .../app/scheduler/jobs/cm/processor/sis/UserProcessor.java | 4 +++- .../sakaiproject/util/impl/EncryptionUtilityServiceImpl.java | 5 ++++- .../sakaiproje... | null |
GHSA-5337-wcgc-wcvp | null | [
{
"commit_message": "[PATCH] basic/unit-name: do not use strdupa() on a path The path may have unbounded length, for example through a fuse mount. CVE-2021-33910: attacked controlled alloca() leads to crash in systemd and ultimately a kernel panic. Systemd parses the content of /proc/self/mountinfo and each mou... | null | |
PYSEC-2021-499 | null | [
{
"commit_message": "[PATCH] Fix memory corruption issue with `tf.raw_ops.DrawBoundingBoxesV2`. PiperOrigin-RevId: 372033910 Change-Id: I8a9f4efc1c8ddaacbc26ec1fbe4bfdd6791c226d tensorflow/core/kernels/image/draw_bounding_box_op.cc | 6 ++++++ 1 file changed, 6 insertions(+)",
"patch_text_b64": "RnJvbSA3OTg2... | null | |
GHSA-q448-6c3m-cxmj | Cross-site Scripting in jeecg-boot | null | [
{
"commit_message": "[PATCH] =?UTF-8?q?=E5=8D=87=E7=BA=A7=E7=A7=AF=E6=9C=A8=E6=8A=A5?= =?UTF-8?q?=E8=A1=A8=E5=88=B0=E6=9C=80=E6=96=B0=E7=89=881.4.32=EF=BC=8C?= =?UTF-8?q?=E8=A7=A3=E5=86=B3=E4=B8=A5=E9=87=8D=E5=AE=89=E5=85=A8=E6=BC=8F?= =?UTF-8?q?=E6=B4=9E?= MIME-Version: 1.0 Content-Type: text/plain; charset=UT... | null |
PYSEC-2022-288 | null | [
{
"commit_message": "[PATCH] FIX make sure pre_dispatch cannot do arbitrary code execution (#1321) CHANGES.rst | 4 ++++ joblib/parallel.py | 10 ++++++++-- 2 files changed, 12 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSBiOTBmMTBlZmViNjcwYTJjYzg3N2ZiODhlYmIzZjIwMTkxODllMDU5IE1vbiBTZXAgMT... | null | |
GHSA-gf72-h4cp-wcm4 | Drupal Open Social Missing Authorization vulnerability | null | [
{
"commit_message": "[PATCH] When language service is not being called make sure to use the route object modules/custom/social_language/src/Access.php | 19 +++++++++++++++---- 1 file changed, 15 insertions(+), 4 deletions(-)",
"patch_text_b64": "RnJvbSA1MmM1MzFlMTU2ZmI4NjUzZTQ3YWI5OWRmNDMyYzRmYjk2NTFmMzZlIE... | null |
CVE-2022-0578 | Code Injection in publify/publify | Code Injection in GitHub repository publify/publify prior to 9.2.8. | [
{
"commit_message": "[PATCH] Do not allow images in comments publify_core/app/models/feedback.rb | 6 +++++- publify_core/spec/models/comment_spec.rb | 23 +++++++++++++++++++++++ 2 files changed, 28 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSBiNTBkZjA1MGM1OTNjYzUzMmIyYzUxNjc5Mjk4OWJjZmNlMm... | CWE-94 Improper Control of Generation of Code |
GHSA-7xr6-r55h-px6v | null | [
{
"commit_message": "[PATCH] HID: cp2112: fix gpio-callback error handling In case of a zero-length report, the gpio direction_input callback would currently return success instead of an errno. Fixes: 1ffb3c40ffb5 (\"HID: cp2112: make transfer buffers DMA capable\") Cc: stable <stable@vger.kernel.org> # 4.9... | null | |
GHSA-8j3w-26mp-75xh | null | [
{
"commit_message": "[PATCH] Fix cross-site scripting (XSS) vulnerability in handling SVG animate attributes Reported by Valentin T. and Lutz Wolf of CrowdStrike. CHANGELOG.md | 1 + program/lib/Roundcube/rcube_washtml.php | 2 +- tests/Framework/Washtml.php | 4 ++++ 3 files... | null | |
PYSEC-2022-43143 | null | [
{
"commit_message": "[PATCH] Eth account support (#361) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit * Create separate execute function * Add is_valid_eth_signature to account library * Add eth_execute to account library * Create eth account mock and test * Add missi... | null | |
CVE-2014-2260 | Cross-site scripting (XSS) vulnerability in plugins/main/content/js/ajenti.coffee in Eugene Pankov Ajenti 1.2.13 allows remote authenticated users to inject arbitrary web script or HTML via the command field in the Cron functionality. | [
{
"commit_message": "[PATCH] [ui] fixes ajenti/plugins/main/content/js/ajenti.coffee | 8 ++++++-- ajenti/plugins/main/content/js/controls.binding.coffee | 3 ++- ajenti/plugins/main/content/js/controls.inputs.coffee | 2 +- 3 files changed, 9 insertions(+), 4 deletions(-)",
"patch_text_b64": "RnJvb... | n/a | |
PYSEC-2021-842 | null | [
{
"commit_message": "[PATCH 1/2] Fix tf.math.segment_max/min/mean/sun/prod crashes(aborts) when segment_ids is large This PR fixes the issue raised in 46888 where tf.math.segment_max/min/mean/sun/prod crashes(aborts) when segment_ids is large. This PR fixes 46888. Signed-off-by: Yong Tang <yong.tang.github@outl... | null | |
GHSA-qc5c-m97j-wqw3 | null | [
{
"commit_message": "[PATCH] Fix #2370 app/Support/Http/Controllers/UserNavigation.php | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSA4NzE3ZjQ2OWIxMGU5ZjdlMTU0N2M2ZjcwZjdkMjRlMTM1OWQyOGQ0IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBKYW1lcyBDb2xlIDx0aGVncnVtcHlkaWN0YXRvckB... | null | |
GHSA-57qw-cc2g-pv5p | lxml Cross-site Scripting Via Control Characters | null | [
{
"commit_message": "[PATCH 1/4] Fix: make the cleaner also remove javascript URLs that use escaping. src/lxml/html/clean.py | 5 +++-- src/lxml/html/tests/test_clean.txt | 6 +++--- 2 files changed, 6 insertions(+), 5 deletions(-)",
"patch_text_b64": "RnJvbSA2YmUxZDA4MWI0OWM5N2NmZDdiM2ZiZDkzNGExO... | null |
GHSA-q63q-pgmf-mxhr | Angular SSR has a Server-Side Request Forgery (SSRF) flaw | null | [
{
"commit_message": "[PATCH] fix(@angular/ssr): prevent malicious URL from overriding host A request with a specially crafted URL starting with a double slash (e.g., `//example.com`) could cause the server-side rendering logic to interpret the request as being for a different host. This is due to the behavior o... | null |
GHSA-c3hj-j6pp-p2f3 | null | [
{
"commit_message": "[PATCH] libsepol/cil: Destroy classperm list when resetting map perms Map perms share the same struct as regular perms, but only the map perms use the classperms field. This field is a pointer to a list of classperms that is created and added to when resolving classmapping rules, so the map... | null | |
GHSA-9fmr-q4gx-jmc2 | null | [
{
"commit_message": "[PATCH] [media] cxusb: Use a dma capable buffer also for reading MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Commit 17ce039b4e54 (\"[media] cxusb: don't do DMA on stack\") added a kmalloc'ed bounce buffer for writes, but missed to do the same fo... | null | |
CVE-2022-0766 | Server-Side Request Forgery (SSRF) in janeczku/calibre-web | Server-Side Request Forgery (SSRF) in GitHub repository janeczku/calibre-web prior to 0.6.17. | [
{
"commit_message": "[PATCH] Don't allow redirects on cover uploads, catch more addresses which resolve to localhost cps/helper.py | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSA5NjUzNTJjOGQ5NmM5ZWFlN2E2ODY3ZmY3NmIwZGIxMzdkMDRiMGI4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9... | CWE-918 Server-Side Request Forgery (SSRF) |
GHSA-hcxp-87ww-ww9m | null | [
{
"commit_message": "[PATCH] Issue #1689: create unique temporary file with g_file_open_tmp(). MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Not sure this is really solving the issue reported, which is that `g_get_tmp_dir()` uses environment variables (yet as g_file_o... | null | |
GHSA-rjqq-98f6-6j3r | Improper Input Validation in sanitize-html | null | [
{
"commit_message": "[PATCH 1/2] stop IDNA iframe attacks index.js | 23 ++++++++++++++------ test/test.js | 59 ++++++++++++++++++++++++++++++++++++++++++++++++++++ 2 files changed, 76 insertions(+), 6 deletions(-)",
"patch_text_b64": "RnJvbSBjYTRiNjJhZGJmYzJiMjk1ZTcxYWQ4ZDYwZmM4YWYxMzY3ZTM4ZGFlIE1vbiBTZ... | null |
GHSA-xxf6-hq9q-9r8q | null | [
{
"commit_message": "[PATCH] Fix null deref in bin.symbols ##crash * Reported by cnitlrt via huntr.dev libr/bin/p/bin_symbols.c | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSA1MTVlNTkyYjliZWEwNjEyYmM2M2Q4ZTkzMjM5ZmYzNWJjZjY0NWM3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOi... | null | |
PYSEC-2021-217 | null | [
{
"commit_message": "[PATCH] Validate arguments of `FractionalMaxPoolGrad` PiperOrigin-RevId: 372274982 Change-Id: If46b0c442efa4eaef635ce6a476717060420122c tensorflow/core/kernels/fractional_max_pool_op.cc | 14 ++++++++++++++ 1 file changed, 14 insertions(+)",
"patch_text_b64": "RnJvbSAzMmZkY2JmZjlkMDZkMDE... | null | |
GHSA-rx6x-hw9j-xhm3 | null | [
{
"commit_message": "[PATCH] Bug 1943: Prevent loading session settings that can lead to remote code execution from handled URLs https://winscp.net/tracker/1943 (cherry picked from commit ec584f5189a856cd79509f754722a6898045c5e0) Source commit: 0f4be408b3f01132b00682da72d925d6c4ee649b source/Console.cbproj ... | null | |
GHSA-7p9r-9x76-5h9r | null | [
{
"commit_message": "[PATCH] robust validation glob/manager_core.py | 2 +- glob/manager_server.py | 17 ++++++++++++++--- pyproject.toml | 2 +- 3 files changed, 16 insertions(+), 5 deletions(-)",
"patch_text_b64": "RnJvbSBmZmMwOTVhM2U1YWNjMWM0MDQ3NzNhMDUxMGU2ZDA1NWE2YTcyYjBlIE1vbiBTZXAgMTcgMDA6MD... | null | |
GHSA-6h3f-43vq-53hj | Directory traversal in zenml | null | [
{
"commit_message": "[PATCH] Improve Artifact Store isolation (#2490) * dir traversal issue * Auto-update of Starter template * Auto-update of NLP template * reroute artifacts and logs via AS * reroute materializers via AS * simplify to one deco * fix materializer tests * allow local download * Auto-update of E... | null |
GHSA-j29f-m23h-3p8p | Cross-site Scripting in Pimcore | null | [
{
"commit_message": "[PATCH] [Admin] Security - Add handler to enable Content Security Policy (#11447) * [Admin] Security - Add handler to enable Content Security Policy * [Admin] Security - Add handler to enable Content Security Policy * [Admin] Security - Add handler to enable Content Security Policy - fix do... | null |
GHSA-jxfh-8wgv-vfr2 | Prototype pollution in dojo | null | [
{
"commit_message": "[PATCH] Merge pull request from GHSA-jxfh-8wgv-vfr2 request/util.js | 2 +- tests/unit/request/util.js | 6 ++++++ 2 files changed, 7 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSAyMGEwMGFmYjY4ZjU1ODc5NDZkYzc2ZmJlYWE2OGMzOWJkYTIxNzFkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQ... | null |
GHSA-g3f3-p9rc-775p | Mattermost Server exposes account details to any Team Administrator | null | [
{
"commit_message": "[PATCH] PLT-2697 Fixing team admins (#2900) * PLT-2697 Fixing team admins * Fixing eslint error * Fixing loc issues * Fixing func * Fixing func api/apitestlib.go | 2 +- api/context.go | 6 +- api/team_test.go ... | null |
GHSA-hq3v-rg6f-6hx4 | Use of Insufficiently Random Values in yiisoft/yii2-dev | null | [
{
"commit_message": "[PATCH] Fix #18817: Use `paragonie/random_compat` for random bytes and int generation composer.json | 3 +- composer.lock | 112 +++++----- framework/CHANGELOG.md | 1 + framework/base/Security.php ... | null |
CVE-2022-1968 | Use After Free in vim/vim | Use After Free in GitHub repository vim/vim prior to 8.2. | [
{
"commit_message": "[PATCH] patch 8.2.5050: using freed memory when searching for pattern in path Problem: Using freed memory when searching for pattern in path. Solution: Make a copy of the line. src/search.c | 21 ++++++++++++++++++--- src/testdir/test_tagjump.vim | 11 +++++++++++ src/ver... | CWE-416 Use After Free |
CVE-2022-1928 | Cross-site Scripting (XSS) - Stored in go-gitea/gitea | Cross-site Scripting (XSS) - Stored in GitHub repository go-gitea/gitea prior to 1.16.9. | [
{
"commit_message": "[PATCH] Fix raw endpoint PDF file headers (#19825) modules/typesniffer/typesniffer.go | 8 ++++++-- routers/common/repo.go | 8 ++++++-- 2 files changed, 12 insertions(+), 4 deletions(-)",
"patch_text_b64": "RnJvbSA2NWUwNjg4YTVjOWRhY2FkNTBlNzEwMjRiNzUyOWZkZjBlM2MyZTljIE1vbiBTZ... | CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
GHSA-7fxx-c4v5-3v6v | null | [
{
"commit_message": "[PATCH] fix \"pixel overrun\" fixes #3 ngiflib.c | 9 +++++++-- 1 file changed, 7 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSBjZjQyOWUwYTJmZTI2YjVmMDFjZTBjOGU5Yjc5NDMyZTk0NTA5YjZlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBUaG9tYXMgQmVybmFyZCA8bWluaXVwbnBAZnJlZS5mcj4KRGF0ZTo... | null | |
GHSA-g26v-2w7v-m2qp | null | [
{
"commit_message": "[PATCH] Server: Fix two issues identified by ASan 1. If the TLSPlain and X509Plain security types were both disabled, then rfbOptPamAuth() would overflow the name field in the secTypes structure when testing the \"none\" security type, since the name of that security type has less than five... | null | |
GHSA-76f8-p2hg-cf8g | null | [
{
"commit_message": "[PATCH] Fixed allocation of large array literals. Previously, allocation of large array literals may result in null-pointer dereference. The reason is that njs_array_alloc() may return a slow array when size is large enough, but the instruction code assumes that array is always flat. The fi... | null | |
CVE-2014-125073 | mapoor voteapp app.py show_refresh sql injection | A vulnerability was found in mapoor voteapp. It has been rated as critical. Affected by this issue is the function create_poll/do_poll/show_poll/show_refresh of the file app.py. The manipulation leads to sql injection. The patch is identified as b290c21a0d8bcdbd55db860afd3cadec97388e72. It is recommended to apply a patch to fix this issue. VDB-217790 is the identifier assigned to this vulnerability. | [
{
"commit_message": "[PATCH] prevent sql injection app.py | 26 ++++++++++++-------------- templates/show.html | 11 ++++++----- 2 files changed, 18 insertions(+), 19 deletions(-)",
"patch_text_b64": "RnJvbSBiMjkwYzIxYTBkOGJjZGJkNTVkYjg2MGFmZDNjYWRlYzk3Mzg4ZTcyIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpG... | CWE-89 SQL Injection |
GHSA-w525-w93j-rxgm | Improper Neutralization of Input During Web Page Generation in Apache ActiveMQ | null | [
{
"commit_message": "[PATCH] https://issues.apache.org/jira/browse/AMQ-6170 Fixing X-Frame-Options header so that is applied for all content served by Jetty. The previous patch wasn't correct because it only applied it to Servlets and JSPs and not static content. This also reverts AMQ-6113 (cherry picked from ... | null |
GHSA-jxwm-2fgw-85f5 | null | [
{
"commit_message": "[PATCH] Fix UAF in `aaef` ##crash * Reported by @hdthky * Reproducer: uaf-aef * BountyID: e98ad92c-3a64-48fb-84d4-d13afdbcbdd7 libr/core/canal.c | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-)",
"patch_text_b64": "RnJvbSA2NGE4MmUyODRkZGRhYmFlYjU0OTIyODM4MDEwM2I1N2RlYWQzMmE2... | null | |
CVE-2025-67897 | In Sequoia before 2.1.0, aes_key_unwrap panics if passed a ciphertext that is too short. A remote attacker can take advantage of this issue to crash an application by sending a victim an encrypted message with a crafted PKESK or SKESK packet. | [
{
"commit_message": "[PATCH] openpgp: Fix an underflow in aes_key_unwrap. MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit - The `aes_key_unwrap` function would panic if passed a ciphertext that was too short. In a debug build, it would panic due to a subtraction underf... | CWE-195 Signed to Unsigned Conversion Error |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.