Dataset Viewer
Auto-converted to Parquet Duplicate
cve_id
stringlengths
13
16
cve_published
timestamp[ns]
cve_descriptions
stringlengths
70
729
cve_metrics
dict
cve_references
listlengths
1
10
cve_configurations
listlengths
1
5
url
stringlengths
40
77
cve_tags
sequencelengths
1
4
domain
stringclasses
1 value
issue_owner_repo
sequencelengths
2
2
issue_body
stringlengths
0
7.94k
issue_title
stringlengths
1
307
issue_comments_url
stringlengths
59
81
issue_comments_count
int64
0
146
issue_created_at
timestamp[ns]
issue_updated_at
stringlengths
20
20
issue_html_url
stringlengths
40
62
issue_github_id
int64
128M
1.01B
issue_number
int64
94
105k
label
bool
2 classes
issue_msg
stringlengths
120
8.13k
issue_msg_n_tokens
int64
120
8.13k
issue_embedding
sequencelengths
3.07k
3.07k
__index_level_0__
int64
0
3.61k
CVE-2020-25663
2020-12-08T21:15:12.420000
A call to ConformPixelInfo() in the SetImageAlphaChannel() routine of /MagickCore/channel.c caused a subsequent heap-use-after-free or heap-buffer-overflow READ when GetPixelRed() or GetPixelBlue() was called. This could occur if an attacker is able to submit a malicious image file to be processed by ImageMagick and co...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891601" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Third Party Advisory" ], "url":...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8FFBE52-1112-43E2-BC1B-D1388F18988C", "versionEndExcluding": "7.0.8-56", "versionEndIncluding": null, "versionS...
https://github.com/ImageMagick/ImageMagick/issues/1723
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
heap-use-after-free at MagickCore/pixel-accessor.h in GetPixelRed
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1723/comments
4
2019-10-06T12:41:15
2020-10-29T00:07:54Z
https://github.com/ImageMagick/ImageMagick/issues/1723
503,095,531
1,723
true
This is a GitHub Issue repo:ImageMagick owner:ImageMagick Title : heap-use-after-free at MagickCore/pixel-accessor.h in GetPixelRed Issue date: --- start body --- ### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have s...
7,538
[ -0.040803104639053345, -0.01668344810605049, -0.004887728951871395, -0.000345785403624177, 0.025615129619836807, 0.020360393449664116, -0.011065132915973663, 0.02897651679813862, -0.008204525336623192, 0.03015643171966076, -0.011943208985030651, -0.015970012173056602, 0.020236913114786148, ...
189
CVE-2019-17453
2019-10-10T17:15:17.843000
Bento4 1.5.1.0 has a NULL pointer dereference in AP4_DescriptorListWriter::Action in Core/Ap4Descriptor.h, related to AP4_IodsAtom::WriteFields in Core/Ap4IodsAtom.cpp, as demonstrated by mp4encrypt or mp4compact.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/436" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "83B32974-D913-4DDB-844F-C58D55ECC17E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/axiomatic-systems/Bento4/issues/436
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
**System Details** Commit ID: bc1b02a Test Machine : Ubuntu 16.04.3 LTS MP4 Compacter - Version 1.0 (Bento4 Version 1.5.1.0) **Command** mp4compact POC /dev/null **ASAN Output** ``` ASAN:DEADLYSIGNAL ================================================================= ==5286==ERROR: AddressSanitizer: SEGV o...
SEGV in mp4compact
https://api.github.com/repos/axiomatic-systems/Bento4/issues/436/comments
0
2019-09-30T07:47:11
2019-10-08T05:14:45Z
https://github.com/axiomatic-systems/Bento4/issues/436
500,109,805
436
true
This is a GitHub Issue repo:Bento4 owner:axiomatic-systems Title : SEGV in mp4compact Issue date: --- start body --- **System Details** Commit ID: bc1b02a Test Machine : Ubuntu 16.04.3 LTS MP4 Compacter - Version 1.0 (Bento4 Version 1.5.1.0) **Command** mp4compact POC /dev/null **ASAN Output** ``` ASAN:DE...
2,378
[ -0.011965548619627953, 0.04515301063656807, -0.0026640277355909348, -0.005301716271787882, 0.03293159604072571, 0.00030078491545282304, -0.0481933169066906, 0.05526728555560112, -0.02752828598022461, 0.029590273275971413, -0.03549026697874069, -0.001637737383134663, 0.013734040781855583, 0...
97
CVE-2019-20159
2019-12-31T00:15:12.243000
"An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a memory lea(...TRUNCATED)
{"cvssMetricV2":[{"acInsufInfo":false,"baseSeverity":"MEDIUM","cvssData":{"accessComplexity":"MEDIUM(...TRUNCATED)
[{"source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"],"url":"https://github.com/gpac/(...TRUNCATED)
[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*","matchCriteriaId":"93E(...TRUNCATED)
https://github.com/gpac/gpac/issues/1321
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
"System info: \r\nUbuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (master 6ada10e) \r\nCompile Command:\r(...TRUNCATED)
AddressSanitizer: a memory leak of dinf_New()
https://api.github.com/repos/gpac/gpac/issues/1321/comments
2
2019-10-28T16:03:11
2020-01-08T12:43:28Z
https://github.com/gpac/gpac/issues/1321
513,400,465
1,321
true
"This is a GitHub Issue\nrepo:gpac\nowner:gpac\nTitle : AddressSanitizer: a memory leak of dinf_New((...TRUNCATED)
1,983
[-0.041972242295742035,0.04615168273448944,-0.013360867276787758,-0.010663499124348164,0.02014134079(...TRUNCATED)
121
CVE-2021-33361
2021-09-13T20:15:08.510000
"Memory leak in the afra_box_read function in MP4Box in GPAC 1.0.1 allows attackers to read memory v(...TRUNCATED)
{"cvssMetricV2":[{"acInsufInfo":false,"baseSeverity":"MEDIUM","cvssData":{"accessComplexity":"MEDIUM(...TRUNCATED)
[{"source":"cve@mitre.org","tags":["Patch","Third Party Advisory"],"url":"https://github.com/gpac/gp(...TRUNCATED)
[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*","matchCriteriaId":"82D(...TRUNCATED)
https://github.com/gpac/gpac/issues/1782
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
null
[security]memory leak in MP4Box afra_box_read
https://api.github.com/repos/gpac/gpac/issues/1782/comments
0
2021-05-08T05:12:31
2023-09-22T06:09:46Z
https://github.com/gpac/gpac/issues/1782
880,294,671
1,782
true
"This is a GitHub Issue\nrepo:gpac\nowner:gpac\nTitle : [security]memory leak in MP4Box afra_box_rea(...TRUNCATED)
152
[-0.02855638787150383,0.027851847931742668,-0.0010830441024154425,0.004425865598022938,0.03516707941(...TRUNCATED)
312
CVE-2021-26197
2021-06-10T23:15:08.403000
"An issue was discovered in JerryScript 2.4.0. There is a SEGV in main_print_unhandled_exception in (...TRUNCATED)
{"cvssMetricV2":[{"acInsufInfo":false,"baseSeverity":"MEDIUM","cvssData":{"accessComplexity":"MEDIUM(...TRUNCATED)
[{"source":"cve@mitre.org","tags":["Exploit","Issue Tracking","Patch","Third Party Advisory"],"url":(...TRUNCATED)
[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:jerryscript:jerryscript:2.4.0:*:*:*:*:*:*:*","matchCr(...TRUNCATED)
https://github.com/jerryscript-project/jerryscript/issues/4403
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
"\r\n###### JerryScript revision\r\n2faafa4\r\n###### Build platform\r\nUbuntu 18.04.5 LTS(Linux 4.1(...TRUNCATED)
SEGV in main_print_unhandled_exception
https://api.github.com/repos/jerryscript-project/jerryscript/issues/4403/comments
0
2021-01-02T14:31:59
2021-01-08T15:03:34Z
https://github.com/jerryscript-project/jerryscript/issues/4403
777,469,465
4,403
true
"This is a GitHub Issue\nrepo:jerryscript\nowner:jerryscript-project\nTitle : SEGV in main_print_unh(...TRUNCATED)
1,622
[-0.01165247242897749,0.00813268218189478,-0.0038732264656573534,0.005057421047240496,0.029455468058(...TRUNCATED)
265
null
null
null
null
null
null
null
null
null
[ "axiomatic-systems", "Bento4" ]
"Hi\r\n\r\nI found an crash erro.\r\n\r\nSystem info:\r\nUbuntu 20.04 : clang 10.0.0 , gcc 9.3.0\r(...TRUNCATED)
NULL pointer dereference of Ap4StszAtom.cpp in function GetSampleSize
https://api.github.com/repos/axiomatic-systems/Bento4/issues/602/comments
1
2021-05-12T06:11:50
2021-07-24T18:23:50Z
https://github.com/axiomatic-systems/Bento4/issues/602
889,698,306
602
false
"This is a GitHub Issue\nrepo:Bento4\nowner:axiomatic-systems\nTitle : NULL pointer dereference of A(...TRUNCATED)
5,655
[-0.0204120222479105,0.0052501726895570755,-0.006331847980618477,0.02064749039709568,0.0443854816257(...TRUNCATED)
2,070
CVE-2021-39525
2021-09-20T16:15:11.990000
"An issue was discovered in libredwg through v0.10.1.3751. bit_read_fixed() in bits.c has a heap-bas(...TRUNCATED)
{"cvssMetricV2":[{"acInsufInfo":false,"baseSeverity":"MEDIUM","cvssData":{"accessComplexity":"MEDIUM(...TRUNCATED)
[{"source":"cve@mitre.org","tags":["Exploit","Issue Tracking","Third Party Advisory"],"url":"https:/(...TRUNCATED)
[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*","matchCriteriaId":"937A(...TRUNCATED)
https://github.com/LibreDWG/libredwg/issues/261
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
"## System info\r\n\r\nUbuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), dwg2dxf (latest master [39ef943](ht(...TRUNCATED)
A heap overflow in bits.c:1424
https://api.github.com/repos/LibreDWG/libredwg/issues/261/comments
1
2020-08-02T04:51:37
2020-08-02T12:15:30Z
https://github.com/LibreDWG/libredwg/issues/261
671,508,299
261
true
"This is a GitHub Issue\nrepo:libredwg\nowner:LibreDWG\nTitle : A heap overflow in bits.c:1424\nIssu(...TRUNCATED)
3,800
[-0.028952211141586304,0.0179443396627903,-0.0033966070041060448,-0.0007030712440609932,0.0591107644(...TRUNCATED)
336
CVE-2020-23266
2021-09-22T00:15:08.567000
"An issue was discovered in gpac 0.8.0. The OD_ReadUTF8String function in odf_code.c has a heap-base(...TRUNCATED)
{"cvssMetricV2":[{"acInsufInfo":false,"baseSeverity":"MEDIUM","cvssData":{"accessComplexity":"MEDIUM(...TRUNCATED)
[{"source":"cve@mitre.org","tags":["Exploit","Issue Tracking","Third Party Advisory"],"url":"https:/(...TRUNCATED)
[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*","matchCriteriaId":"93E(...TRUNCATED)
https://github.com/gpac/gpac/issues/1481
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
"- [ y] I looked for a similar issue and couldn't find any.\r\n- [ y] I tried with the latest versio(...TRUNCATED)
Heap-buffer-overflow in OD_ReadUTF8String() odf_code.c
https://api.github.com/repos/gpac/gpac/issues/1481/comments
1
2020-05-12T18:18:19
2020-06-11T15:01:32Z
https://github.com/gpac/gpac/issues/1481
616,861,182
1,481
true
"This is a GitHub Issue\nrepo:gpac\nowner:gpac\nTitle : Heap-buffer-overflow in OD_ReadUTF8String() (...TRUNCATED)
4,906
[-0.04395993426442146,0.03342880681157112,-0.008312067948281765,0.004054483957588673,0.0210472103208(...TRUNCATED)
343
CVE-2019-12979
2019-06-26T18:15:10.417000
"ImageMagick 7.0.8-34 has a \"use of uninitialized value\" vulnerability in the SyncImageSettings fu(...TRUNCATED)
{"cvssMetricV2":[{"acInsufInfo":false,"baseSeverity":"MEDIUM","cvssData":{"accessComplexity":"MEDIUM(...TRUNCATED)
[{"source":"cve@mitre.org","tags":["Mailing List","Third Party Advisory"],"url":"http://lists.opensu(...TRUNCATED)
[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:imagemagick:imagemagick:7.0.8-34:*:*:*:*:*:*:*","matc(...TRUNCATED)
https://github.com/ImageMagick/ImageMagick/issues/1522
[ "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
"### Prerequisites\r\n\r\n- [ Y ] I have written a descriptive issue title\r\n- [ Y ] I have verifie(...TRUNCATED)
Use-of-uninitialized-value in function SyncImageSettings.
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1522/comments
5
2019-03-21T11:58:29
2019-08-10T06:30:27Z
https://github.com/ImageMagick/ImageMagick/issues/1522
423,694,012
1,522
true
"This is a GitHub Issue\nrepo:ImageMagick\nowner:ImageMagick\nTitle : Use-of-uninitialized-value in (...TRUNCATED)
1,728
[-0.03209313005208969,0.04295886680483818,-0.003528564004227519,0.03164505586028099,0.01354716531932(...TRUNCATED)
48
null
null
null
null
null
null
null
null
null
[ "jerryscript-project", "jerryscript" ]
"E.g\r\n\r\n```\r\nclass foo\r\n{\r\npublic:\r\n void printxx(const char* str)\r\n {\r\n (...TRUNCATED)
How to register a C++ class to the script?
https://api.github.com/repos/jerryscript-project/jerryscript/issues/4711/comments
1
2021-07-15T06:53:59
2022-10-13T12:55:30Z
https://github.com/jerryscript-project/jerryscript/issues/4711
945,061,608
4,711
false
"This is a GitHub Issue\nrepo:jerryscript\nowner:jerryscript-project\nTitle : How to register a C++ (...TRUNCATED)
429
[-0.008068752475082874,0.015139308758080006,-0.018095504492521286,0.010634628124535084,0.04340873658(...TRUNCATED)
2,265
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
18

Collection including DanCip/github-issues-vul-detection-pre