Dataset Viewer
Auto-converted to Parquet Duplicate
func_before
stringlengths
10
482k
func_after
stringlengths
14
484k
cve_id
stringlengths
13
28
cwe_id
stringclasses
776 values
cve_description
stringlengths
30
3.31k
commit_link
stringlengths
48
164
commit_message
stringlengths
1
30.3k
file_name
stringlengths
4
244
extension
stringclasses
20 values
datetime
stringdate
1999-11-10 02:42:49
2024-01-29 16:00:57
public void test_like_startsWith() { Entity from = from(Entity.class); where(from.getCode()).like().startsWith("test"); Query<Entity> select = select(from); assertEquals("select entity_0 from Entity entity_0 where entity_0.code like 'test%'", select.getQuery()); }
public void test_like_startsWith() { Entity from = from(Entity.class); where(from.getCode()).like().startsWith("test"); Query<Entity> select = select(from); assertEquals("select entity_0 from Entity entity_0 where entity_0.code like :code_1", select.getQuery()); assertEquals("test%", select.getParameters().g...
CVE-2019-11343
NVD-CWE-noinfo
Torpedo Query before 2.5.3 mishandles the LIKE operator in ConditionBuilder.java, LikeCondition.java, and NotLikeCondition.java.
https://github.com/xjodoin/torpedoquery/commit/3c20b874fba9cc2a78b9ace10208de1602b56c3f
Fix issue with like
ConditionBuilder.java
java
2020-03-12T21:15:00Z
@Nullable public String getSourceSpawnerName(){ String spawnerName = this.sourceSpawnerName; if (this.sourceSpawnerName == null){ synchronized (livingEntity.getPersistentDataContainer()){ if (getPDC().has(main.namespaced_keys.sourceSpawnerName, PersistentDataType.STRING)...
@Nullable public String getSourceSpawnerName(){ if (this.sourceSpawnerName != null) return this.sourceSpawnerName; if (getPDCLock()) { try { if (getPDC().has(main.namespaced_keys.sourceSpawnerName, PersistentDataType.STRING)) this.sourceSpawnerName = ...
null
null
null
https://github.com/ArcanePlugins/LevelledMobs/commit/b6f820e0e861b368623996b006c6b6300b6eadc0
3.3.0 b574 * when using any of the new variables `%home_distance%`, `%home_distance_with_bed%`, `%bed_distance%` and the player is in nether, if no bed or home location is present then the portal they entered the nether from is utilised * improved locking code to prevent potential server crashes / hangs * added LM 3.2...
src/main/java/me/lokka30/levelledmobs/misc/LivingEntityWrapper.java
java
2021-11-29T15:53:33Z
int WavpackSetConfiguration64 (WavpackContext *wpc, WavpackConfig *config, int64_t total_samples, const unsigned char *chan_ids) { uint32_t flags, bps = 0; uint32_t chan_mask = config->channel_mask; int num_chans = config->num_channels; int i; wpc->stream_version = (config->flags & CONFIG_COMPA...
int WavpackSetConfiguration64 (WavpackContext *wpc, WavpackConfig *config, int64_t total_samples, const unsigned char *chan_ids) { uint32_t flags, bps = 0; uint32_t chan_mask = config->channel_mask; int num_chans = config->num_channels; int i; if (!config->sample_rate) { strcpy (wpc->err...
CVE-2018-19840
CWE-835
The function WavpackPackInit in pack_utils.c in libwavpack.a in WavPack through 5.1.0 allows attackers to cause a denial-of-service (resource exhaustion caused by an infinite loop) via a crafted wav audio file because WavpackSetConfiguration64 mishandles a sample rate of zero.
https://github.com/dbry/WavPack/commit/070ef6f138956d9ea9612e69586152339dbefe51
issue #53: error out on zero sample rate
src/pack_utils.c
c
2018-11-30T05:00:42Z
isdn_ppp_ioctl(int min, struct file *file, unsigned int cmd, unsigned long arg) { unsigned long val; int r, i, j; struct ippp_struct *is; isdn_net_local *lp; struct isdn_ppp_comp_data data; void __user *argp = (void __user *)arg; is = file->private_data; lp = is->lp; if (is->debug & 0x1) printk(KERN_DEBUG ...
isdn_ppp_ioctl(int min, struct file *file, unsigned int cmd, unsigned long arg) { unsigned long val; int r, i, j; struct ippp_struct *is; isdn_net_local *lp; struct isdn_ppp_comp_data data; void __user *argp = (void __user *)arg; is = file->private_data; lp = is->lp; if (is->debug & 0x1) printk(KERN_DEBUG ...
CVE-2015-7799
null
The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel through 4.2.3 does not ensure that certain slot numbers are valid, which allows local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call.
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/drivers/net/slip/slhc.c?id=4ab42d78e37a294ac7bc56901d563c642e03c4ae
ppp, slip: Validate VJ compression slot parameters completely Currently slhc_init() treats out-of-range values of rslots and tslots as equivalent to 0, except that if tslots is too large it will dereference a null pointer (CVE-2015-7799). Add a range-check at the top of the function and make it return an ERR_PTR() on...
null
null
null
public void trimChangedTagNamesValues() { Entity entity = getEntity(); if (entity == null) { return; } Set<String> changedTags = new HashSet<>(entity.getChangedTags()); if (!Algorithms.isEmpty(changedTags)) { for (String changedTag : changedTags) { if (changedTag == null || changedTag.trim().equals(...
public void trimChangedTagNamesValues() { Entity entity = getEntity(); if (entity == null || entity.getChangedTags() == null) { return; } Set<String> changedTags = new HashSet<>(entity.getChangedTags()); if (!Algorithms.isEmpty(changedTags)) { for (String changedTag : changedTags) { if (changedTag =...
null
null
null
https://github.com/osmandapp/OsmAnd/commit/31ad764da69284c64be01b06290a56af99d23dd1
Fix #15245 CRASH on upload new POI
OsmAnd/src/net/osmand/plus/plugins/osmedit/data/OpenstreetmapPoint.java
java
2022-09-19T17:32:38Z
@Override public int suggestedInternalSecurityLevel() { // invoked after nextTurn() processing is complete on each civ's turn // also invoked when contact is made in mid-turn // return from 0 to 40, which translates to 0% to 20% of total prod // // modnar: is it not 0% to 10%...
@Override public int suggestedInternalSecurityLevel() { // invoked after nextTurn() processing is complete on each civ's turn // also invoked when contact is made in mid-turn // return from 0 to 40, which translates to 0% to 20% of total prod // // modnar: is it not 0% to 10%...
null
null
null
https://github.com/rayfowler/rotp-public/commit/e4239ef2d2162d2bc31a5bb2a6aa9134034aa7e6
Xilmi ai (#45) * Replaced many isPlayer() by isPlayerControlled() This leads to a more fluent experience on AutoPlay. Note: the council-voting acts weird when you try that there, getting you stuck, and the News-Broadcasts also seem to use a differnt logic and are always shown. * Orion-guard-handling Avoid sending c...
src/rotp/model/ai/xilmi/AISpyMaster.java
java
2021-03-26T15:26:00Z
public static int canRestrictMember (TdApi.ChatMemberStatus me, TdApi.ChatMemberStatus him) { if (him.getConstructor() == TdApi.ChatMemberStatusCreator.CONSTRUCTOR) { return RESTRICT_MODE_NONE; } switch (me.getConstructor()) { case TdApi.ChatMemberStatusCreator.CONSTRUCTOR: switch (him.g...
public static int canRestrictMember (TdApi.ChatMemberStatus me, TdApi.ChatMemberStatus him) { if (him.getConstructor() == TdApi.ChatMemberStatusCreator.CONSTRUCTOR) { return RESTRICT_MODE_NONE; } switch (me.getConstructor()) { case TdApi.ChatMemberStatusCreator.CONSTRUCTOR: switch (him.g...
null
null
null
https://github.com/TGX-Android/Telegram-X/commit/4ac723c4100ee888b9e0f01ddcf44a259d81d73c
fixed crash when deleting messages from different senders in supergroups + added managing admin rights in message menu + improved banning/unbanning chats + fixed unavailable save button when changing only blocked date + fixed screenshot availability for chat preview + other bugfixes
app/src/main/java/org/thunderdog/challegram/data/TD.java
java
2021-12-12T01:41:10Z
QPDF::resolveObjectsInStream(int obj_stream_number) { // Force resolution of object stream QPDFObjectHandle obj_stream = getObjectByID(obj_stream_number, 0); if (! obj_stream.isStream()) { throw QPDFExc(qpdf_e_damaged_pdf, this->m->file->getName(), this->m->last_object_description, this...
QPDF::resolveObjectsInStream(int obj_stream_number) { // Force resolution of object stream QPDFObjectHandle obj_stream = getObjectByID(obj_stream_number, 0); if (! obj_stream.isStream()) { throw QPDFExc(qpdf_e_damaged_pdf, this->m->file->getName(), this->m->last_object_description, this...
null
CWE-787
null
https://github.com/qpdf/qpdf/commit/d71f05ca07eb5c7cfa4d6d23e5c1f2a800f52e8e
Fix sign and conversion warnings (major) This makes all integer type conversions that have potential data loss explicit with calls that do range checks and raise an exception. After this commit, qpdf builds with no warnings when -Wsign-conversion -Wconversion is used with gcc or clang or when -W3 -Wd4800 is used with ...
null
null
2019-06-21T03:35:23Z
static DataSource lookupDataSource(Hints hints) throws FactoryException { Object hint = hints.get(Hints.EPSG_DATA_SOURCE); if (hint instanceof DataSource) { return (DataSource) hint; } else if (hint instanceof String) { String name = (String) hint; InitialCont...
static DataSource lookupDataSource(Hints hints) throws FactoryException { Object hint = hints.get(Hints.EPSG_DATA_SOURCE); if (hint instanceof DataSource) { return (DataSource) hint; } else if (hint instanceof String) { String name = (String) hint; try { ...
CVE-2022-24818
CWE-917,CWE-20
GeoTools is an open source Java library that provides tools for geospatial data. The GeoTools library has a number of data sources that can perform unchecked JNDI lookups, which in turn can be used to perform class deserialization and result in arbitrary code execution. Similar to the Log4J case, the vulnerability can ...
https://github.com/geotools/geotools/commit/4f70fa3234391dd0cda883a20ab0ec75688cba49
[GEOT-7115] Streamline JNDI lookups
AbstractEpsgMediator.java
java
2022-04-13T21:15:00Z
vips_foreign_load_gif_scan_image( VipsForeignLoadGif *gif ) { VipsObjectClass *class = VIPS_OBJECT_GET_CLASS( gif ); GifFileType *file = gif->file; ColorMapObject *map = file->Image.ColorMap ? file->Image.ColorMap : file->SColorMap; GifByteType *extension; if( DGifGetImageDesc( gif->file ) == GIF_ERROR...
vips_foreign_load_gif_scan_image( VipsForeignLoadGif *gif ) { VipsObjectClass *class = VIPS_OBJECT_GET_CLASS( gif ); GifFileType *file = gif->file; ColorMapObject *map; GifByteType *extension; if( DGifGetImageDesc( gif->file ) == GIF_ERROR ) { vips_foreign_load_gif_error( gif ); return( -1 ); } /...
CVE-2019-17534
CWE-416
vips_foreign_load_gif_scan_image in foreign/gifload.c in libvips before 8.8.2 tries to access a color map before a DGifGetImageDesc call, leading to a use-after-free.
https://github.com/libvips/libvips/commit/ce684dd008532ea0bf9d4a1d89bacb35f4a83f4d
fetch map after DGifGetImageDesc() Earlier refactoring broke GIF map fetch.
gifload.c
c
2019-08-27T11:50:52Z
I18NCustomBindings::I18NCustomBindings(ScriptContext* context) : ObjectBackedNativeHandler(context) { RouteFunction( "GetL10nMessage", base::Bind(&I18NCustomBindings::GetL10nMessage, base::Unretained(this))); RouteFunction("GetL10nUILanguage", base::Bind(&I18NCustomBindings::GetL...
I18NCustomBindings::I18NCustomBindings(ScriptContext* context) : ObjectBackedNativeHandler(context) { RouteFunction( "GetL10nMessage", "i18n", base::Bind(&I18NCustomBindings::GetL10nMessage, base::Unretained(this))); RouteFunction("GetL10nUILanguage", "i18n", base::Bind(&I18NCust...
CVE-2016-1696
CWE-254,CWE-284
The extensions subsystem in Google Chrome before 51.0.2704.79 does not properly restrict bindings access, which allows remote attackers to bypass the Same Origin Policy via unspecified vectors.
https://github.com/chromium/chromium/commit/c0569cc04741cccf6548c2169fcc1609d958523f
[Extensions] Expand bindings access checks BUG=601149 BUG=601073 Review URL: https://codereview.chromium.org/1866103002 Cr-Commit-Position: refs/heads/master@{#387710}
extensions/renderer/i18n_custom_bindings.cc
cc
2016-04-15T21:51:21Z
uppdateCard(id, asked, answered) { this.get( `SELECT * FROM flashcards WHERE id="${id}"`, (err, card) => { if (!card || !card.id) throw 'could not update the card'; this.run(`REPLACE INTO flashcards VALUES(${card.id}, ${card.user}, "${card.text}", "${card....
uppdateCard(id, asked, answered) { this.get( 'SELECT * FROM flashcards WHERE id = ?', [id], (err, card) => { if (!card || !card.id) throw 'could not update the card'; this.run( 'REPLACE INTO flashcards VALUES(?, ?, ?, ?, ?, ...
CVE-2019-15561
CWE-89
FlashLingo before 2019-06-12 allows SQL injection, related to flashlingo.js and db.js.
https://github.com/vpoliakov/FlashLingo/commit/42537d90087a920210048d6fe32c2d8c801790b9
Fixes for sql injection and app rerendering
db.js
js
2019-06-12T20:55:08Z
int ipmi_destroy_user(struct ipmi_user *user) { _ipmi_destroy_user(user); cleanup_srcu_struct(&user->release_barrier); kref_put(&user->refcount, free_user); return 0; }
int ipmi_destroy_user(struct ipmi_user *user) { _ipmi_destroy_user(user); kref_put(&user->refcount, free_user); return 0; }
null
CWE-416, CWE-284
null
https://github.com/torvalds/linux/commit/77f8269606bf95fcb232ee86f6da80886f1dfae8
ipmi: fix use-after-free of user->release_barrier.rda When we do the following test, we got oops in ipmi_msghandler driver while((1)) do service ipmievd restart & service ipmievd restart done --------------------------------------------------------------- [ 294.230186] Unable to handle kernel paging request at virt...
null
null
2019-01-16T05:33:22Z
static void chomp3(ChannelData *ctx, int16_t *output, uint8_t val, const uint16_t tab1[], const int16_t *tab2, int tab2_stride, uint32_t numChannels) { int16_t current; current = tab2[((ctx->index & 0x7f0) >> 4)*tab2_stride + val]; current = mace_brok...
static void chomp3(ChannelData *ctx, int16_t *output, uint8_t val, const uint16_t tab1[], const int16_t *tab2, int tab2_stride, uint32_t numChannels) { int16_t current; if (val < tab2_stride) current = tab2[((ctx->index & 0x7f0) >> 4)*tab2_stride ...
null
null
null
FFmpeg/commit/f36aec3b5e18c4c167612d0051a6d5b6144b3552
Exploit symmetry to reduce size of tables by half. Originally committed as revision 15255 to svn://svn.ffmpeg.org/ffmpeg/trunk
./ffmpeg/libavcodec/mace.c
c
2008-09-07T17:20:55Z
def _clean_code(self, code: str) -> str: """ A method to clean the code to prevent malicious code execution Args: code(str): A python code Returns (str): Returns a Clean Code String """ tree = ast.parse(code) new_body = [] # clear recent ...
def _clean_code(self, code: str) -> str: """ A method to clean the code to prevent malicious code execution Args: code(str): A python code Returns (str): Returns a Clean Code String """ tree = ast.parse(code) new_body = [] # clear recent ...
null
null
null
https://github.com/gventuri/pandas-ai/commit/3aac79be8fc1d18b53d66a566adddbbdd2b38ad5
fix: bypass the security check with prompt injection (#399) (#409)
pandasai/__init__.py
py
2023-07-28T23:29:40Z
void Messageheader::Parser::checkHeaderspace(unsigned chars) const { if (headerdataPtr + chars >= header.rawdata + sizeof(header.rawdata)) throw HttpError(HTTP_REQUEST_ENTITY_TOO_LARGE, "header too large"); }
void Messageheader::Parser::checkHeaderspace(unsigned chars) const { if (headerdataPtr + chars >= header.rawdata + sizeof(header.rawdata)) { header.rawdata[sizeof(header.rawdata) - 1] = '\0'; throw HttpError(HTTP_REQUEST_ENTITY_TOO_LARGE, "header too large"); } }
CVE-2013-7299
CWE-200
framework/common/messageheaderparser.cpp in Tntnet before 2.2.1 allows remote attackers to obtain sensitive information via a header that ends in \n instead of \r\n, which prevents a null terminator from being added and causes Tntnet to include headers from other requests.
https://github.com/maekitalo/tntnet/commit/9bd3b14042e12d84f39ea9f55731705ba516f525
fix possible information leak
null
null
2013-12-11T13:59:32Z
public static String loadTextFile(BufferedReader iStream) throws IOException { StringWriter buffer = null; PrintWriter writer = null; try { buffer = new StringWriter(); writer = new PrintWriter(buffer); String line = null; while ((line = iStream.readLine()) != null) writer.pr...
public static String loadTextFile(BufferedReader iStream) throws IOException { try (StringWriter buffer = new StringWriter(); PrintWriter writer = new PrintWriter(buffer);) { String line = null; while ((line = iStream.readLine()) != null) { writer.println(line); } return buffer.toStr...
null
null
null
https://github.com/apache/uima-uimaj/commit/aeb44042110b2e5876437126d496633fff1cc091
Merge pull request #145 from apache/bugfix/UIMA-6387-Update-p2-repo-URLs-from-http-to-https [UIMA-6387] Update p2 repo URLs from http to https
uimaj-core/src/main/java/org/apache/uima/pear/util/FileUtil.java
java
2023-01-24T07:25:16Z
static unsigned int XBMInteger(Image *image,short int *hex_digits) { int c; unsigned int value; /* Skip any leading whitespace. */ do { c=ReadBlobByte(image); if (c == EOF) return(0); } while ((c == ' ') || (c == '\t') || (c == '\n') || (c == '\r')); /* Evaluate num...
static int XBMInteger(Image *image,short int *hex_digits) { int c; unsigned int value; /* Skip any leading whitespace. */ do { c=ReadBlobByte(image); if (c == EOF) return(-1); } while ((c == ' ') || (c == '\t') || (c == '\n') || (c == '\r')); /* Evaluate number. *...
null
null
null
https://github.com/ImageMagick/ImageMagick/commit/b8c63b156bf26b52e710b1a0643c846a6cd01e56
https://github.com/ImageMagick/ImageMagick/issues/712
coders/xbm.c
c
2017-08-31T13:10:37Z
public function dump($value) { $dumper = $this->getDumper(); if ($dumper) { // re-use the same DumpOutput instance, so it won't re-render the global styles/scripts on each dump. // exclude verbose information (e.g. exception stack traces) if (class_exists('Symfon...
public function dump($value) { $dumper = $this->getDumper(); if ($dumper) { // re-use the same DumpOutput instance, so it won't re-render the global styles/scripts on each dump. // exclude verbose information (e.g. exception stack traces) if (class_exists('Symfon...
CVE-2017-16880
CWE-79
The dump function in Util/TemplateHelper.php in filp whoops before 2.1.13 has XSS.
https://github.com/filp/whoops/commit/c16791d28d1ca3139e398145f0c6565c523c291a
TemplateHelper: fix XSS if Symfony dumper is not available
TemplateHelper.php
php
2017-11-17T21:29:00Z
static int vvfat_open(BlockDriverState *bs, QDict *options, int flags) { BDRVVVFATState *s = bs->opaque; int cyls, heads, secs; bool floppy; const char *dirname; QemuOpts *opts; Error *local_err = NULL; int ret; #ifdef DEBUG vvv = s; #endif DLOG(if (stderr == NULL) { stderr = fopen("...
static int vvfat_open(BlockDriverState *bs, QDict *options, int flags) { BDRVVVFATState *s = bs->opaque; int cyls, heads, secs; bool floppy; const char *dirname; QemuOpts *opts; Error *local_err = NULL; int ret; #ifdef DEBUG vvv = s; #endif DLOG(if (stderr == NULL) { stderr = fopen("...
null
null
null
qemu/commit/78f27bd02ceba4a2f6ac5c725f4d4410eec205ef
block: fix vvfat error path for enable_write_target s->qcow and s->qcow_filename are allocated but not freed on error. Fix the possible leaks, remove unnecessary check for bdrv_new(), propagate ret code of bdrv_create() and also the one of enable_write_target(). Signed-off-by: Fam Zheng <famz@redhat.com> Reviewed-by:...
./qemu/block/vvfat.c
c
2013-07-17T09:57:37Z
static void php_wddx_push_element(void *user_data, const XML_Char *name, const XML_Char **atts) { st_entry ent; wddx_stack *stack = (wddx_stack *)user_data; if (!strcmp(name, EL_PACKET)) { int i; if (atts) for (i=0; atts[i]; i++) { if (!strcmp(atts[i], EL_VERSION)) { /* nothing for now */ } } } el...
static void php_wddx_push_element(void *user_data, const XML_Char *name, const XML_Char **atts) { st_entry ent; wddx_stack *stack = (wddx_stack *)user_data; if (!strcmp(name, EL_PACKET)) { int i; if (atts) for (i=0; atts[i]; i++) { if (!strcmp(atts[i], EL_VERSION)) { /* nothing for now */ } } } el...
CVE-2017-11143
CWE-502
In PHP before 5.6.31, an invalid free in the WDDX deserialization of boolean parameters could be used by attackers able to inject XML for deserialization to crash the PHP interpreter, related to an invalid free for an empty boolean element in ext/wddx/wddx.c.
https://git.php.net/?p=php-src.git;a=commit;h=2aae60461c2ff7b7fbcdd194c789ac841d0747d7
null
null
null
null
bool IsIdentityConsumingSwitch(const MutableGraphView& graph, const NodeDef& node) { if ((IsIdentity(node) || IsIdentityNSingleInput(node)) && node.input_size() > 0) { TensorId tensor_id = ParseTensorName(node.input(0)); if (IsTensorIdControlling(tensor_id)) { return...
bool IsIdentityConsumingSwitch(const MutableGraphView& graph, const NodeDef& node) { if ((IsIdentity(node) || IsIdentityNSingleInput(node)) && node.input_size() > 0) { TensorId tensor_id = ParseTensorName(node.input(0)); if (IsTensorIdControlling(tensor_id)) { return...
CVE-2022-23589
CWE-476
Tensorflow is an Open Source Machine Learning Framework. Under certain scenarios, Grappler component of TensorFlow can trigger a null pointer dereference. There are 2 places where this can occur, for the same malicious alteration of a `SavedModel` file (fixing the first one would trigger the same dereference in the sec...
https://github.com/tensorflow/tensorflow/commit/045deec1cbdebb27d817008ad5df94d96a08b1bf
Prevent null pointer dereference in `mutable_graph_view` PiperOrigin-RevId: 409684472 Change-Id: I577eb9d9ac470fcec0501423171e739a4ec0cb5c
mutable_graph_view.cc
cc
2021-11-13T18:12:22Z
TfLiteStatus Prepare(TfLiteContext* context, TfLiteNode* node) { TF_LITE_ENSURE_EQ(context, NumInputs(node), 2); TF_LITE_ENSURE_EQ(context, NumOutputs(node), 1); const TfLiteTensor* input = GetInput(context, node, kInputTensor); TfLiteTensor* output = GetOutput(context, node, kOutputTensor); TF_LITE_ENSURE_...
TfLiteStatus Prepare(TfLiteContext* context, TfLiteNode* node) { TF_LITE_ENSURE_EQ(context, NumInputs(node), 2); TF_LITE_ENSURE_EQ(context, NumOutputs(node), 1); const TfLiteTensor* input; TF_LITE_ENSURE_OK(context, GetInputSafe(context, node, kInputTensor, &input)); TfLiteTensor* output; TF_LITE_ENSURE_O...
CVE-2020-15211
CWE-125,CWE-787
In TensorFlow Lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, saved models in the flatbuffer format use a double indexing scheme: a model has a set of subgraphs, each subgraph has a set of operators and each operator has a set of input/output tensors. The flatbuffer format uses indices for the tensors, inde...
https://github.com/tensorflow/tensorflow/commit/1970c2158b1ffa416d159d03c3370b9a462aee35
[tflite]: Insert `nullptr` checks when obtaining tensors. As part of ongoing refactoring, `tflite::GetInput`, `tflite::GetOutput`, `tflite::GetTemporary` and `tflite::GetIntermediates` will return `nullptr` in some cases. Hence, we insert the `nullptr` checks on all usages. We also insert `nullptr` checks on usages o...
add_n.cc
cc
2020-09-25T19:15:00Z
@Method(0x800ebb44L) public static void FUN_800ebb44() { final WMapStruct258 struct = struct258_800c66a8; _800c86fc.setu(0x1L); struct._24 = new WMapStruct258Sub60[24]; //LAB_800ebbb4 final VECTOR sp0x20 = new VECTOR(); for(int i = 0; i < 12; i++) { final WMapStruct258Sub60 sp18 = new ...
@Method(0x800ebb44L) public static void FUN_800ebb44() { final WMapStruct258 struct = struct258_800c66a8; _800c86fc.setu(0x1L); struct._24 = new WMapStruct258Sub60[24]; //LAB_800ebbb4 final VECTOR sp0x20 = new VECTOR(); for(int i = 0; i < 12; i++) { final WMapStruct258Sub60 sp18 = new ...
null
null
null
https://github.com/Legend-of-Dragoon-Modding/Severed-Chains/commit/54e5a8cf898d43d53da9bcabdd49130a48a9e738
Fix crash on wmap
src/main/java/legend/game/WMap.java
java
2023-01-25T23:06:21Z
static int map_freeze(const union bpf_attr *attr) { int err = 0, ufd = attr->map_fd; struct bpf_map *map; struct fd f; if (CHECK_ATTR(BPF_MAP_FREEZE)) return -EINVAL; f = fdget(ufd); map = __bpf_map_get(f); if (IS_ERR(map)) return PTR_ERR(map); if (map->map_type == BPF_MAP_TYPE_STRUCT_OPS || map_val...
static int map_freeze(const union bpf_attr *attr) { int err = 0, ufd = attr->map_fd; struct bpf_map *map; struct fd f; if (CHECK_ATTR(BPF_MAP_FREEZE)) return -EINVAL; f = fdget(ufd); map = __bpf_map_get(f); if (IS_ERR(map)) return PTR_ERR(map); if (map->map_type == BPF_MAP_TYPE_STRUCT_OPS || map_val...
CVE-2021-4001
CWE-367
A race condition was found in the Linux kernel's ebpf verifier between bpf_map_update_elem and bpf_map_freeze due to a missing lock in kernel/bpf/syscall.c. In this flaw, a local user with a special privilege (cap_sys_admin or cap_bpf) can modify the frozen mapped address space. This flaw affects kernel versions prior ...
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=353050be4c19e102178ccc05988101887c25ae53
bpf: Fix toctou on read-only map's constant scalar tracking Commit a23740ec43ba ("bpf: Track contents of read-only maps as scalars") is checking whether maps are read-only both from BPF program side and user space side, and then, given their content is constant, reading out their data via map->ops->map_direct_value_ad...
null
null
null
static struct prog_entry * predicate_parse(const char *str, int nr_parens, int nr_preds, parse_pred_fn parse_pred, void *data, struct filter_parse_error *pe) { struct prog_entry *prog_stack; struct prog_entry *prog; const char *ptr = str; char *inverts = NULL; int *op_stack; int *top; int invert = 0; int re...
static struct prog_entry * predicate_parse(const char *str, int nr_parens, int nr_preds, parse_pred_fn parse_pred, void *data, struct filter_parse_error *pe) { struct prog_entry *prog_stack; struct prog_entry *prog; const char *ptr = str; char *inverts = NULL; int *op_stack; int *top; int invert = 0; int re...
null
null
null
https://github.com/torvalds/linux/commit/81f9c4e4177d31ced6f52a89bb70e93bfb77ca03
Merge tag 'trace-v4.18-rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/rostedt/linux-trace Pull tracing fixes from Steven Rostedt: "This contains a few fixes and a clean up. - a bad merge caused an "endif" to go in the wrong place in scripts/Makefile.build - softirq tracing fix for tracing that cor...
kernel/trace/trace_events_filter.c
c
2018-06-23T22:23:28Z
jas_image_t *jp2_decode(jas_stream_t *in, const char *optstr) { jp2_box_t *box; int found; jas_image_t *image; jp2_dec_t *dec; bool samedtype; int dtype; unsigned int i; jp2_cmap_t *cmapd; jp2_pclr_t *pclrd; jp2_cdef_t *cdefd; unsigned int channo; int newcmptno; int_fast32_t *lutents; #if 0 jp2_cdefchan_t...
jas_image_t *jp2_decode(jas_stream_t *in, const char *optstr) { jp2_box_t *box; int found; jas_image_t *image; jp2_dec_t *dec; bool samedtype; int dtype; unsigned int i; jp2_cmap_t *cmapd; jp2_pclr_t *pclrd; jp2_cdef_t *cdefd; unsigned int channo; int newcmptno; int_fast32_t *lutents; #if 0 jp2_cdefchan_t...
CVE-2021-3443
CWE-476
A NULL pointer dereference flaw was found in the way Jasper versions before 2.0.27 handled component references in the JP2 image format decoder. A specially crafted JP2 image file could cause an application using the Jasper library to crash when opened.
https://github.com/jasper-software/jasper/commit/f94e7499a8b1471a4905c4f9c9e12e60fe88264b
Fixes #269. Added a check for an invalid component reference in the JP2 decoder. Added a related test case for the JP2 codec.
null
null
2021-03-14T04:04:58Z
static int rawv6_sendmsg(struct sock *sk, struct msghdr *msg, size_t len) { struct ipv6_txoptions opt_space; DECLARE_SOCKADDR(struct sockaddr_in6 *, sin6, msg->msg_name); struct in6_addr *daddr, *final_p, final; struct inet_sock *inet = inet_sk(sk); struct ipv6_pinfo *np = inet6_sk(sk); struct raw6_sock *rp = raw...
static int rawv6_sendmsg(struct sock *sk, struct msghdr *msg, size_t len) { struct ipv6_txoptions *opt_to_free = NULL; struct ipv6_txoptions opt_space; DECLARE_SOCKADDR(struct sockaddr_in6 *, sin6, msg->msg_name); struct in6_addr *daddr, *final_p, final; struct inet_sock *inet = inet_sk(sk); struct ipv6_pinfo *np...
null
CWE-416, CWE-284, CWE-264
null
https://github.com/torvalds/linux/commit/45f6fad84cc305103b28d73482b344d7f5b76f39
ipv6: add complete rcu protection around np->opt This patch addresses multiple problems : UDP/RAW sendmsg() need to get a stable struct ipv6_txoptions while socket is not locked : Other threads can change np->opt concurrently. Dmitry posted a syzkaller (http://github.com/google/syzkaller) program desmonstrating use-a...
null
null
2015-11-30T03:37:57Z
static int frame_thread_init(AVCodecContext *avctx) { int thread_count = avctx->thread_count; AVCodec *codec = avctx->codec; AVCodecContext *src = avctx; FrameThreadContext *fctx; int i, err = 0; if (thread_count <= 1) { avctx->active_thread_type = 0; return 0; } avctx->t...
static int frame_thread_init(AVCodecContext *avctx) { int thread_count = avctx->thread_count; AVCodec *codec = avctx->codec; AVCodecContext *src = avctx; FrameThreadContext *fctx; int i, err = 0; if (thread_count <= 1) { avctx->active_thread_type = 0; return 0; } avctx->t...
null
null
null
FFmpeg/commit/2bb79b23fe106a45eab6ff80d7ef7519d542d1f7
pthread: next try on freeing threads without crashing. This should fix mingw Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
./ffmpeg/libavcodec/pthread.c
c
2011-11-27T04:55:20Z
static unsigned tget_long(const uint8_t **p, int le) { unsigned v = le ? AV_RL32(*p) : AV_RB32(*p); *p += 4; return v; }
static unsigned tget_long(GetByteContext *gb, int le) { return le ? bytestream2_get_le32(gb) : bytestream2_get_be32(gb); }
null
null
null
FFmpeg/commit/0a467a9b594dd67aa96bad687d05f8845b009f18
tiffdec: use bytestream2 to simplify overread/overwrite protection Based on a patch by Paul B Mahol <onemda@gmail.com> CC:libav-stable@libav.org
./ffmpeg/libavcodec/tiff.c
c
2013-09-29T23:47:55Z
@Override public void load(CompoundTag compoundTag) { super.load(compoundTag); this.color = compoundTag.contains(COLOR_TAG) ? compoundTag.getInt(COLOR_TAG) : DEFAULT_COLOR; if (compoundTag.contains(STATUS_EFFECT_TAG) && !compoundTag.getString(STATUS_EFFECT_TAG).trim().equals("")) { ...
@Override public void load(CompoundTag compoundTag) { super.load(compoundTag); this.color = compoundTag.contains(COLOR_TAG) ? compoundTag.getInt(COLOR_TAG) : DEFAULT_COLOR; if (compoundTag.contains(STATUS_EFFECT_TAG) && !compoundTag.getString(STATUS_EFFECT_TAG).trim().equals("")) { ...
null
null
null
https://github.com/TelepathicGrunt/Bumblezone/commit/920145e344a09483c3be9eb9c1d761394e03c119
fixed incense candle server crash
src/main/java/com/telepathicgrunt/the_bumblezone/blocks/blockentities/IncenseCandleBlockEntity.java
java
2022-12-03T15:50:15Z
void CLASS foveon_dp_load_raw() { unsigned c, roff[4], row, col, diff; ushort huff[512], vpred[2][2], hpred[2]; fseek (ifp, 8, SEEK_CUR); foveon_huff (huff); roff[0] = 48; FORC3 roff[c+1] = -(-(roff[c] + get4()) & -16); FORC3 { fseek (ifp, data_offset+roff[c], SEEK_SET); getbits(-1); vpred[0]...
void CLASS foveon_dp_load_raw() { unsigned c, roff[4], row, col, diff; ushort huff[1024], vpred[2][2], hpred[2]; fseek (ifp, 8, SEEK_CUR); foveon_huff (huff); roff[0] = 48; FORC3 roff[c+1] = -(-(roff[c] + get4()) & -16); FORC3 { fseek (ifp, data_offset+roff[c], SEEK_SET); getbits(-1); vpred[0...
null
CWE-119, CWE-787, CWE-190
null
https://github.com/LibRaw/LibRaw-demosaic-pack-GPL2/commit/194f592e205990ea8fce72b6c571c14350aca716
Fixed possible foveon buffer overrun (Secunia SA750000)
null
null
2017-03-04T16:55:24Z
private void blockIdOrDataChanged() { int blockType = comboBoxBlockType.getSelectedIndex(); int dataValue = (Integer) spinnerDataValue.getValue(); material = Material.get(blockType, dataValue); namespace = material.namespace; simpleName = material.simpleName; loadActualPr...
private void blockIdOrDataChanged() { int blockType = comboBoxBlockType.getSelectedIndex(); int dataValue = (Integer) spinnerDataValue.getValue(); if ((blockType < 0) || (blockType > 4095) || (dataValue < 0) || (dataValue > 15)) { // No idea why this happens, but it has been observed...
null
null
null
https://github.com/Captain-Chaos/WorldPainter/commit/020c7d3eb35f818f61931d073e9885bc8ce1bca8
Bug fix: actions that need a world and/or dimension to be set beep instead of crashing Don't crash when stored hidden palette name does not exist as a palette (not clear how that can happen; perhaps it only contains hidden layers from CombinedLayers?)
WorldPainter/WPGUI/src/main/java/org/pepsoft/worldpainter/MaterialSelector.java
java
2022-10-23T12:19:29Z
public void addObjectLight(TileObject tileObject, int plane, int sizeX, int sizeY, int orientation) { for (Light l : OBJECT_LIGHTS.get(tileObject.getId())) { // prevent duplicate lights being spawned for the same object if (sceneLights.stream().anyMatch(light -> light.object != null && tileObjectHash(light.o...
public void addObjectLight(TileObject tileObject, int plane, int sizeX, int sizeY, int orientation) { for (Light l : OBJECT_LIGHTS.get(tileObject.getId())) { // prevent objects at plane -1 and under from having lights if (tileObject.getPlane() <= -1) { continue; } // prevent duplicate lights being...
null
null
null
https://github.com/RS117/RLHD/commit/300fe8495d5cd4d4d1bad9a9f36f694d08017950
Light Crash Fixes (#322) * Light Crash Fixes Made it to if the plane is -1 or under it defaults to 0 to stop any crashes * Object 14419 is what was causing the issues - Ignore Objects at -1 and below - Ignore Npcs at -1 and below
src/main/java/rs117/hd/scene/lighting/LightManager.java
java
2022-07-01T23:41:47Z
static void nbd_co_receive_reply(NBDClientSession *s, NBDRequest *request, NBDReply *reply, QEMUIOVector *qiov) { int ret; qemu_coroutine_yield(); *reply = s->reply; if (reply->handle != request->hand...
static void nbd_co_receive_reply(NBDClientSession *s, NBDRequest *request, NBDReply *reply, QEMUIOVector *qiov) { int ret; qemu_coroutine_yield(); *reply = s->reply; if (reply->handle != request->hand...
null
null
null
qemu/commit/72b6ffc76653214b69a94a7b1643ff80df134486
nbd-client: Fix regression when server sends garbage When we switched NBD to use coroutines for qemu 2.9 (in particular, commit a12a712a), we introduced a regression: if a server sends us garbage (such as a corrupted magic number), we quit the read loop but do not stop sending further queued commands, resulting in the...
./qemu/block/nbd-client.c
c
2017-08-14T21:34:26Z
PUBLIC ssize httpWriteUploadData(HttpConn *conn, MprList *fileData, MprList *formData) { char *path, *pair, *key, *value, *name; cchar *type; ssize rc; int next; rc = 0; if (formData) { for (rc = next = 0; rc >= 0 && (pair = mprGetNextItem(formData, &next)) != 0; ) { ...
PUBLIC ssize httpWriteUploadData(HttpConn *conn, MprList *fileData, MprList *formData) { char *path, *pair, *key, *value, *name; cchar *type; ssize rc; int next; rc = 0; if (formData) { for (rc = next = 0; rc >= 0 && (pair = mprGetNextItem(formData, &next)) != 0; ) { ...
CVE-2014-9708
CWE-476
Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".
https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
httpLib.c
c
2015-03-31T14:59:00Z
struct clock_source *dce100_clock_source_create( struct dc_context *ctx, struct dc_bios *bios, enum clock_source_id id, const struct dce110_clk_src_regs *regs, bool dp_clk_src) { struct dce110_clk_src *clk_src = kzalloc(sizeof(struct dce110_clk_src), GFP_KERNEL); if (!clk_src) return NULL; if (dce110_clk_...
struct clock_source *dce100_clock_source_create( struct dc_context *ctx, struct dc_bios *bios, enum clock_source_id id, const struct dce110_clk_src_regs *regs, bool dp_clk_src) { struct dce110_clk_src *clk_src = kzalloc(sizeof(struct dce110_clk_src), GFP_KERNEL); if (!clk_src) return NULL; if (dce110_clk_...
CVE-2019-19083
CWE-703
Memory leaks in *clock_source_create() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption). This affects the dce112_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c, the dce100_clock_so...
https://github.com/torvalds/linux/commit/055e547478a11a6360c7ce05e2afc3e366968a12
drm/amd/display: memory leak In dcn*_clock_source_create when dcn20_clk_src_construct fails allocated clk_src needs release. Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com> Signed-off-by: Alex Deucher <alexander.deucher@amd.com>
dce100_resource.c
c
2019-09-17T03:20:44Z
get_pols_2_svc(gpols_arg *arg, struct svc_req *rqstp) { static gpols_ret ret; char *prime_arg; gss_buffer_desc client_name, service_name; OM_uint32 minor_stat; kadm5_server_handle_t handle; const ch...
get_pols_2_svc(gpols_arg *arg, struct svc_req *rqstp) { static gpols_ret ret; char *prime_arg; gss_buffer_desc client_name = GSS_C_EMPTY_BUFFER; gss_buffer_desc service_name = GSS_C_EMPTY_BUFFER; OM_uint32 ...
CVE-2015-8631
CWE-772
Multiple memory leaks in kadmin/server/server_stubs.c in kadmind in MIT Kerberos 5 (aka krb5) before 1.13.4 and 1.14.x before 1.14.1 allow remote authenticated users to cause a denial of service (memory consumption) via a request specifying a NULL principal name.
https://github.com/krb5/krb5/commit/83ed75feba32e46f736fcce0d96a0445f29b96c2
Fix leaks in kadmin server stubs [CVE-2015-8631] In each kadmind server stub, initialize the client_name and server_name variables, and release them in the cleanup handler. Many of the stubs will otherwise leak the client and server name if krb5_unparse_name() fails. Also make sure to free the prime_arg variables in...
server_stubs.c
c
2016-01-08T18:16:54Z
End of preview. Expand in Data Studio

Dataset Card for TitanVul

TitanVul is a large-scale function-level vulnerability dataset constructed for training machine learning models for vulnerability detection. It consists of paired vulnerability-fix function samples aggregated from multiple public sources and validated using a multi-agent LLM framework.

Dataset Details

TitanVul is designed to provide high-quality training data that generalizes across vulnerability types and codebases. The dataset is built by aggregating seven public vulnerability datasets, followed by extensive deduplication and multi-agent LLM-based validation to reduce noise and improve label reliability.

  • Curated by: Yikun Li, Ngoc Tan Bui, Ting Zhang, Martin Weyssow, Chengran Yang, Xin Zhou, Jinfeng Jiang, Junkai Chen, Huihui Huang, Huu Hung Nguyen, Chiok Yew Ho, Jie Tan, Ruiyin Li, Yide Yin, Han Wei Ang, Frank Liauw, Eng Lieh Ouh, Lwin Khin Shar, David Lo
  • Language(s): Source code (multilingual).
  • Paper: arXiv:2507.21817 (Out of Distribution, Out of Luck: How Well Can LLMs Trained on Vulnerability Datasets Detect Top 25 CWE Weaknesses?)

Dataset Structure

TitanVul is released as a CSV archive containing function-level vulnerability-fix pairs:

  • Each sample represents a vulnerable function and its corresponding fixed version.
  • The dataset includes metadata aggregated from multiple public sources.
  • Deduplication is applied to reduce overlap across merged datasets.

The released version contains 38,548 vulnerability-fix function pairs.

Citation

@article{li2025titanvul,
  title={Out of Distribution, Out of Luck: How Well Can LLMs Trained on Vulnerability Datasets Detect Top 25 CWE Weaknesses?},
  author={Li, Yikun and Bui, Ngoc Tan and Zhang, Ting and Weyssow, Martin and Yang, Chengran and Zhou, Xin and Jiang, Jinfeng and Chen, Junkai and Huang, Huihui and Nguyen, Huu Hung and Ho, Chiok Yew and Tan, Jie and Li, Ruiyin and Yin, Yide and Ang, Han Wei and Liauw, Frank and Ouh, Eng Lieh and Shar, Lwin Khin and Lo, David},
  journal={arXiv preprint arXiv:2507.21817},
  year={2025}
}
Downloads last month
19

Paper for comet1910/TitanVul