Automating Vulnerability Detection in GitHub Issues
Collection
https://arxiv.org/abs/2501.05258 • 3 items • Updated
cve_id stringlengths 13 16 ⌀ | cve_published timestamp[ns] | cve_descriptions stringlengths 70 729 ⌀ | cve_metrics dict | cve_references listlengths 1 10 ⌀ | cve_configurations listlengths 1 5 ⌀ | url stringlengths 40 77 ⌀ | cve_tags sequencelengths 1 4 ⌀ | domain stringclasses 1
value | issue_owner_repo sequencelengths 2 2 | issue_body stringlengths 0 7.94k ⌀ | issue_title stringlengths 1 307 | issue_comments_url stringlengths 59 81 | issue_comments_count int64 0 146 | issue_created_at timestamp[ns] | issue_updated_at stringlengths 20 20 | issue_html_url stringlengths 40 62 | issue_github_id int64 128M 1.01B | issue_number int64 94 105k | label bool 2
classes | issue_msg stringlengths 120 8.13k | issue_msg_n_tokens int64 120 8.13k | issue_embedding sequencelengths 3.07k 3.07k | __index_level_0__ int64 0 3.61k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2020-25663 | 2020-12-08T21:15:12.420000 | A call to ConformPixelInfo() in the SetImageAlphaChannel() routine of /MagickCore/channel.c caused a subsequent heap-use-after-free or heap-buffer-overflow READ when GetPixelRed() or GetPixelBlue() was called. This could occur if an attacker is able to submit a malicious image file to be processed by ImageMagick and co... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891601"
},
{
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url":... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A8FFBE52-1112-43E2-BC1B-D1388F18988C",
"versionEndExcluding": "7.0.8-56",
"versionEndIncluding": null,
"versionS... | https://github.com/ImageMagick/ImageMagick/issues/1723 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to... | heap-use-after-free at MagickCore/pixel-accessor.h in GetPixelRed | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1723/comments | 4 | 2019-10-06T12:41:15 | 2020-10-29T00:07:54Z | https://github.com/ImageMagick/ImageMagick/issues/1723 | 503,095,531 | 1,723 | true | This is a GitHub Issue
repo:ImageMagick
owner:ImageMagick
Title : heap-use-after-free at MagickCore/pixel-accessor.h in GetPixelRed
Issue date:
--- start body ---
### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have s... | 7,538 | [
-0.040803104639053345,
-0.01668344810605049,
-0.004887728951871395,
-0.000345785403624177,
0.025615129619836807,
0.020360393449664116,
-0.011065132915973663,
0.02897651679813862,
-0.008204525336623192,
0.03015643171966076,
-0.011943208985030651,
-0.015970012173056602,
0.020236913114786148,
... | 189 |
CVE-2019-17453 | 2019-10-10T17:15:17.843000 | Bento4 1.5.1.0 has a NULL pointer dereference in AP4_DescriptorListWriter::Action in Core/Ap4Descriptor.h, related to AP4_IodsAtom::WriteFields in Core/Ap4IodsAtom.cpp, as demonstrated by mp4encrypt or mp4compact. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/436"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/axiomatic-... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "83B32974-D913-4DDB-844F-C58D55ECC17E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | https://github.com/axiomatic-systems/Bento4/issues/436 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"axiomatic-systems",
"Bento4"
] | **System Details**
Commit ID: bc1b02a
Test Machine : Ubuntu 16.04.3 LTS
MP4 Compacter - Version 1.0
(Bento4 Version 1.5.1.0)
**Command**
mp4compact POC /dev/null
**ASAN Output**
```
ASAN:DEADLYSIGNAL
=================================================================
==5286==ERROR: AddressSanitizer: SEGV o... | SEGV in mp4compact | https://api.github.com/repos/axiomatic-systems/Bento4/issues/436/comments | 0 | 2019-09-30T07:47:11 | 2019-10-08T05:14:45Z | https://github.com/axiomatic-systems/Bento4/issues/436 | 500,109,805 | 436 | true | This is a GitHub Issue
repo:Bento4
owner:axiomatic-systems
Title : SEGV in mp4compact
Issue date:
--- start body ---
**System Details**
Commit ID: bc1b02a
Test Machine : Ubuntu 16.04.3 LTS
MP4 Compacter - Version 1.0
(Bento4 Version 1.5.1.0)
**Command**
mp4compact POC /dev/null
**ASAN Output**
```
ASAN:DE... | 2,378 | [
-0.011965548619627953,
0.04515301063656807,
-0.0026640277355909348,
-0.005301716271787882,
0.03293159604072571,
0.00030078491545282304,
-0.0481933169066906,
0.05526728555560112,
-0.02752828598022461,
0.029590273275971413,
-0.03549026697874069,
-0.001637737383134663,
0.013734040781855583,
0... | 97 |
CVE-2019-20159 | 2019-12-31T00:15:12.243000 | "An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a memory lea(...TRUNCATED) | {"cvssMetricV2":[{"acInsufInfo":false,"baseSeverity":"MEDIUM","cvssData":{"accessComplexity":"MEDIUM(...TRUNCATED) | [{"source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"],"url":"https://github.com/gpac/(...TRUNCATED) | [{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*","matchCriteriaId":"93E(...TRUNCATED) | https://github.com/gpac/gpac/issues/1321 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | "System info: \r\nUbuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (master 6ada10e) \r\nCompile Command:\r(...TRUNCATED) | AddressSanitizer: a memory leak of dinf_New() | https://api.github.com/repos/gpac/gpac/issues/1321/comments | 2 | 2019-10-28T16:03:11 | 2020-01-08T12:43:28Z | https://github.com/gpac/gpac/issues/1321 | 513,400,465 | 1,321 | true | "This is a GitHub Issue\nrepo:gpac\nowner:gpac\nTitle : AddressSanitizer: a memory leak of dinf_New((...TRUNCATED) | 1,983 | [-0.041972242295742035,0.04615168273448944,-0.013360867276787758,-0.010663499124348164,0.02014134079(...TRUNCATED) | 121 |
CVE-2021-33361 | 2021-09-13T20:15:08.510000 | "Memory leak in the afra_box_read function in MP4Box in GPAC 1.0.1 allows attackers to read memory v(...TRUNCATED) | {"cvssMetricV2":[{"acInsufInfo":false,"baseSeverity":"MEDIUM","cvssData":{"accessComplexity":"MEDIUM(...TRUNCATED) | [{"source":"cve@mitre.org","tags":["Patch","Third Party Advisory"],"url":"https://github.com/gpac/gp(...TRUNCATED) | [{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*","matchCriteriaId":"82D(...TRUNCATED) | https://github.com/gpac/gpac/issues/1782 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | null | [security]memory leak in MP4Box afra_box_read | https://api.github.com/repos/gpac/gpac/issues/1782/comments | 0 | 2021-05-08T05:12:31 | 2023-09-22T06:09:46Z | https://github.com/gpac/gpac/issues/1782 | 880,294,671 | 1,782 | true | "This is a GitHub Issue\nrepo:gpac\nowner:gpac\nTitle : [security]memory leak in MP4Box afra_box_rea(...TRUNCATED) | 152 | [-0.02855638787150383,0.027851847931742668,-0.0010830441024154425,0.004425865598022938,0.03516707941(...TRUNCATED) | 312 |
CVE-2021-26197 | 2021-06-10T23:15:08.403000 | "An issue was discovered in JerryScript 2.4.0. There is a SEGV in main_print_unhandled_exception in (...TRUNCATED) | {"cvssMetricV2":[{"acInsufInfo":false,"baseSeverity":"MEDIUM","cvssData":{"accessComplexity":"MEDIUM(...TRUNCATED) | [{"source":"cve@mitre.org","tags":["Exploit","Issue Tracking","Patch","Third Party Advisory"],"url":(...TRUNCATED) | [{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:jerryscript:jerryscript:2.4.0:*:*:*:*:*:*:*","matchCr(...TRUNCATED) | https://github.com/jerryscript-project/jerryscript/issues/4403 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | "\r\n###### JerryScript revision\r\n2faafa4\r\n###### Build platform\r\nUbuntu 18.04.5 LTS(Linux 4.1(...TRUNCATED) | SEGV in main_print_unhandled_exception | https://api.github.com/repos/jerryscript-project/jerryscript/issues/4403/comments | 0 | 2021-01-02T14:31:59 | 2021-01-08T15:03:34Z | https://github.com/jerryscript-project/jerryscript/issues/4403 | 777,469,465 | 4,403 | true | "This is a GitHub Issue\nrepo:jerryscript\nowner:jerryscript-project\nTitle : SEGV in main_print_unh(...TRUNCATED) | 1,622 | [-0.01165247242897749,0.00813268218189478,-0.0038732264656573534,0.005057421047240496,0.029455468058(...TRUNCATED) | 265 |
null | null | null | null | null | null | null | null | null | [
"axiomatic-systems",
"Bento4"
] | "Hi\r\n\r\nI found an crash erro.\r\n\r\nSystem info:\r\nUbuntu 20.04 : clang 10.0.0 , gcc 9.3.0\r(...TRUNCATED) | NULL pointer dereference of Ap4StszAtom.cpp in function GetSampleSize | https://api.github.com/repos/axiomatic-systems/Bento4/issues/602/comments | 1 | 2021-05-12T06:11:50 | 2021-07-24T18:23:50Z | https://github.com/axiomatic-systems/Bento4/issues/602 | 889,698,306 | 602 | false | "This is a GitHub Issue\nrepo:Bento4\nowner:axiomatic-systems\nTitle : NULL pointer dereference of A(...TRUNCATED) | 5,655 | [-0.0204120222479105,0.0052501726895570755,-0.006331847980618477,0.02064749039709568,0.0443854816257(...TRUNCATED) | 2,070 |
CVE-2021-39525 | 2021-09-20T16:15:11.990000 | "An issue was discovered in libredwg through v0.10.1.3751. bit_read_fixed() in bits.c has a heap-bas(...TRUNCATED) | {"cvssMetricV2":[{"acInsufInfo":false,"baseSeverity":"MEDIUM","cvssData":{"accessComplexity":"MEDIUM(...TRUNCATED) | [{"source":"cve@mitre.org","tags":["Exploit","Issue Tracking","Third Party Advisory"],"url":"https:/(...TRUNCATED) | [{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*","matchCriteriaId":"937A(...TRUNCATED) | https://github.com/LibreDWG/libredwg/issues/261 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] | "## System info\r\n\r\nUbuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), dwg2dxf (latest master [39ef943](ht(...TRUNCATED) | A heap overflow in bits.c:1424 | https://api.github.com/repos/LibreDWG/libredwg/issues/261/comments | 1 | 2020-08-02T04:51:37 | 2020-08-02T12:15:30Z | https://github.com/LibreDWG/libredwg/issues/261 | 671,508,299 | 261 | true | "This is a GitHub Issue\nrepo:libredwg\nowner:LibreDWG\nTitle : A heap overflow in bits.c:1424\nIssu(...TRUNCATED) | 3,800 | [-0.028952211141586304,0.0179443396627903,-0.0033966070041060448,-0.0007030712440609932,0.0591107644(...TRUNCATED) | 336 |
CVE-2020-23266 | 2021-09-22T00:15:08.567000 | "An issue was discovered in gpac 0.8.0. The OD_ReadUTF8String function in odf_code.c has a heap-base(...TRUNCATED) | {"cvssMetricV2":[{"acInsufInfo":false,"baseSeverity":"MEDIUM","cvssData":{"accessComplexity":"MEDIUM(...TRUNCATED) | [{"source":"cve@mitre.org","tags":["Exploit","Issue Tracking","Third Party Advisory"],"url":"https:/(...TRUNCATED) | [{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*","matchCriteriaId":"93E(...TRUNCATED) | https://github.com/gpac/gpac/issues/1481 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | "- [ y] I looked for a similar issue and couldn't find any.\r\n- [ y] I tried with the latest versio(...TRUNCATED) | Heap-buffer-overflow in OD_ReadUTF8String() odf_code.c | https://api.github.com/repos/gpac/gpac/issues/1481/comments | 1 | 2020-05-12T18:18:19 | 2020-06-11T15:01:32Z | https://github.com/gpac/gpac/issues/1481 | 616,861,182 | 1,481 | true | "This is a GitHub Issue\nrepo:gpac\nowner:gpac\nTitle : Heap-buffer-overflow in OD_ReadUTF8String() (...TRUNCATED) | 4,906 | [-0.04395993426442146,0.03342880681157112,-0.008312067948281765,0.004054483957588673,0.0210472103208(...TRUNCATED) | 343 |
CVE-2019-12979 | 2019-06-26T18:15:10.417000 | "ImageMagick 7.0.8-34 has a \"use of uninitialized value\" vulnerability in the SyncImageSettings fu(...TRUNCATED) | {"cvssMetricV2":[{"acInsufInfo":false,"baseSeverity":"MEDIUM","cvssData":{"accessComplexity":"MEDIUM(...TRUNCATED) | [{"source":"cve@mitre.org","tags":["Mailing List","Third Party Advisory"],"url":"http://lists.opensu(...TRUNCATED) | [{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:imagemagick:imagemagick:7.0.8-34:*:*:*:*:*:*:*","matc(...TRUNCATED) | https://github.com/ImageMagick/ImageMagick/issues/1522 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | "### Prerequisites\r\n\r\n- [ Y ] I have written a descriptive issue title\r\n- [ Y ] I have verifie(...TRUNCATED) | Use-of-uninitialized-value in function SyncImageSettings. | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1522/comments | 5 | 2019-03-21T11:58:29 | 2019-08-10T06:30:27Z | https://github.com/ImageMagick/ImageMagick/issues/1522 | 423,694,012 | 1,522 | true | "This is a GitHub Issue\nrepo:ImageMagick\nowner:ImageMagick\nTitle : Use-of-uninitialized-value in (...TRUNCATED) | 1,728 | [-0.03209313005208969,0.04295886680483818,-0.003528564004227519,0.03164505586028099,0.01354716531932(...TRUNCATED) | 48 |
null | null | null | null | null | null | null | null | null | [
"jerryscript-project",
"jerryscript"
] | "E.g\r\n\r\n```\r\nclass foo\r\n{\r\npublic:\r\n void printxx(const char* str)\r\n {\r\n (...TRUNCATED) | How to register a C++ class to the script? | https://api.github.com/repos/jerryscript-project/jerryscript/issues/4711/comments | 1 | 2021-07-15T06:53:59 | 2022-10-13T12:55:30Z | https://github.com/jerryscript-project/jerryscript/issues/4711 | 945,061,608 | 4,711 | false | "This is a GitHub Issue\nrepo:jerryscript\nowner:jerryscript-project\nTitle : How to register a C++ (...TRUNCATED) | 429 | [-0.008068752475082874,0.015139308758080006,-0.018095504492521286,0.010634628124535084,0.04340873658(...TRUNCATED) | 2,265 |