Dataset Viewer
Auto-converted to Parquet Duplicate
cve_id
stringclasses
476 values
cve_published
stringclasses
476 values
cve_descriptions
stringclasses
475 values
cve_metrics
dict
cve_references
listlengths
1
64
cve_configurations
listlengths
1
4
cve_primary_cwe
stringclasses
54 values
cve_tags
sequencelengths
1
4
issue_owner_repo
sequencelengths
2
2
issue_body
stringlengths
0
8.04k
issue_title
stringlengths
1
677
issue_comments_url
stringlengths
59
81
issue_comments_count
int64
0
76
issue_created_at
timestamp[ns]
issue_updated_at
stringlengths
20
20
issue_html_url
stringlengths
40
62
issue_github_id
int64
128M
2.89B
issue_number
int64
96
131k
label
bool
2 classes
issue_msg
stringlengths
120
8.18k
issue_msg_n_tokens
int64
120
8.18k
issue_embedding
sequencelengths
3.07k
3.07k
__index_level_0__
int64
3
4.74k
CVE-2023-34626
2023-06-15T16:15:09.347
Piwigo 13.7.0 is vulnerable to SQL Injection via the "Users" function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/Piwigo/Piwigo/issues/1924" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisor...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4B9AEE3-C9C5-4D20-BA38-9E5A2A64FABD", "versionEndExcluding": null, "versionEndIncluding": "13.7.0", "versionStartExcludin...
89
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
[ "Piwigo", "Piwigo" ]
Access the 'Users' function and use the filter function ![image](https://github.com/Piwigo/Piwigo/assets/67749472/e2d503b5-096f-4528-97f1-8b9b015cc222) Observe the request on Burp Suite ![image](https://github.com/Piwigo/Piwigo/assets/67749472/7e4280b1-3b93-4c36-9bd3-a03aa1645555) Manipulate the 'order' or 'e...
SQL Injection in the "Users" function of piwigo
https://api.github.com/repos/Piwigo/Piwigo/issues/1924/comments
0
2023-05-25T07:54:09
2023-05-29T10:27:38Z
https://github.com/Piwigo/Piwigo/issues/1924
1,725,285,095
1,924
true
This is a GitHub Issue repo:Piwigo owner:Piwigo Title : SQL Injection in the "Users" function of piwigo Issue date: --- start body --- Access the 'Users' function and use the filter function ![image](https://github.com/Piwigo/Piwigo/assets/67749472/e2d503b5-096f-4528-97f1-8b9b015cc222) Observe the request on Burp...
1,691
[ -0.031218959018588066, 0.016001466661691666, -0.0023554214276373386, -0.010765640996396542, 0.03222692385315895, 0.008945701643824577, 0.017541415989398956, 0.014531515538692474, 0.008147728629410267, 0.016141461208462715, -0.00422785896807909, -0.021629279479384422, -0.003706376301124692, ...
729
null
null
null
null
null
null
No_CWE
null
[ "python", "cpython" ]
# Bug report ### Bug description: ```python # Add a code block here, if required ``` Pour décoder l'image à partir de la chaîne de données Base64 que vous avez fournie, je vais vous montrer les étapes à suivre en utilisant Python. Si vous avez Python installé sur votre ordinateur, vous pouvez exécuter le code suivant...
<spam/malware>
https://api.github.com/repos/python/cpython/issues/130560/comments
0
2025-02-25T22:57:50
2025-02-25T23:00:44Z
https://github.com/python/cpython/issues/130560
2,879,730,535
130,560
false
This is a GitHub Issue repo:cpython owner:python Title : <spam/malware> Issue date: --- start body --- # Bug report ### Bug description: ```python # Add a code block here, if required ``` Pour décoder l'image à partir de la chaîne de données Base64 que vous avez fournie, je vais vous montrer les étapes à suivre en u...
2,154
[ -0.007851722650229931, -0.023476436734199524, 0.0009313632035627961, 0.0057760621421039104, 0.033725906163454056, 0.007708573713898659, 0.02313287928700447, 0.03200811520218849, 0.02570956014096737, 0.05562769994139671, 0.000988622778095305, -0.05015940964221954, 0.005500500556081533, 0.01...
4,089
null
null
null
null
null
null
No_CWE
null
[ "ImageMagick", "ImageMagick" ]
"### ImageMagick version\r\n\r\n7.1.1-38 Q16-HDRI x86_64 22398\r\n\r\n### Operating system\r\n\r\nLi(...TRUNCATED)
MNG file consumes all RAM
https://api.github.com/repos/ImageMagick/ImageMagick/issues/7832/comments
1
2024-12-13T15:07:47
2024-12-13T18:48:52Z
https://github.com/ImageMagick/ImageMagick/issues/7832
2,738,606,342
7,832
false
"This is a GitHub Issue\nrepo:ImageMagick\nowner:ImageMagick\nTitle : MNG file consumes all RAM\nIss(...TRUNCATED)
696
[-0.019289691001176834,-0.005754487589001656,-0.0012495073024183512,-0.017060840502381325,0.01951933(...TRUNCATED)
2,547
null
null
null
null
null
null
No_CWE
null
[ "gpac", "gpac" ]
"Hello, I am a graduate student specializing in static analysis of programs. Recently, while using a(...TRUNCATED)
bug report
https://api.github.com/repos/gpac/gpac/issues/2767/comments
1
2024-02-28T08:07:30
2024-03-26T13:16:11Z
https://github.com/gpac/gpac/issues/2767
2,158,353,764
2,767
false
"This is a GitHub Issue\nrepo:gpac\nowner:gpac\nTitle : bug report\nIssue date:\n\n--- start body --(...TRUNCATED)
586
[-0.024535484611988068,0.039849795401096344,-0.018409758806228638,0.00958773773163557,0.024730985984(...TRUNCATED)
1,121
null
null
null
null
null
null
No_CWE
null
[ "xuxueli", "xxl-job" ]
"我在本地启动项目(单机),ExecutorRegistryThread隔几秒中就打印“xxl-job regis(...TRUNCATED)
程序启动后,隔几秒就打印“xxl-job registry success”,如何优化?
https://api.github.com/repos/xuxueli/xxl-job/issues/3629/comments
2
2025-01-15T03:18:02
2025-01-15T09:14:26Z
https://github.com/xuxueli/xxl-job/issues/3629
2,788,742,706
3,629
false
"This is a GitHub Issue\nrepo:xxl-job\nowner:xuxueli\nTitle : 程序启动后,隔几秒就打印(...TRUNCATED)
413
[0.023570414632558823,0.018265917897224426,-0.003974528517574072,-0.025845967233181,0.02041846700012(...TRUNCATED)
4,212
null
null
null
null
null
null
No_CWE
null
[ "ImageMagick", "ImageMagick" ]
"### ImageMagick version\r\n\r\n7.1.1-38 Q16-HDRI x86_64 22398\r\n\r\n### Operating system\r\n\r\nLi(...TRUNCATED)
Inconsistent results converting between color profiles, notably involving the Lab color space
https://api.github.com/repos/ImageMagick/ImageMagick/issues/7724/comments
8
2024-10-26T12:29:32
2024-10-29T16:03:49Z
https://github.com/ImageMagick/ImageMagick/issues/7724
2,615,833,591
7,724
false
"This is a GitHub Issue\nrepo:ImageMagick\nowner:ImageMagick\nTitle : Inconsistent results convertin(...TRUNCATED)
4,785
[0.013960670679807663,-0.026025043800473213,-0.013151474297046661,0.016363736242055893,-0.0211698692(...TRUNCATED)
2,575
CVE-2024-41361
2024-08-29T20:15:08.953
"RPi-Jukebox-RFID v2.7.0 was discovered to contain a remote code execution (RCE) vulnerability via h(...TRUNCATED)
{"cvssMetricV2":null,"cvssMetricV30":null,"cvssMetricV31":[{"cvssData":{"attackComplexity":"LOW","at(...TRUNCATED)
[{"source":"cve@mitre.org","tags":["Exploit","Issue Tracking"],"url":"https://github.com/MiczFlor/RP(...TRUNCATED)
[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:sourcefabric:phoniebox:2.7.0:*:*:*:*:*:*:*","matchCri(...TRUNCATED)
94
[ "Exploit", "Issue Tracking" ]
[ "MiczFlor", "RPi-Jukebox-RFID" ]
"### Version\n\nv2.7.0\n\n### Branch\n\nreleased \n\n### OS\n\nubuntu 22\n\n### Pi model\n\nunknown\(...TRUNCATED)
🐛 | RPi-Jukebox-RFID V2.7_RCE_3
https://api.github.com/repos/MiczFlor/RPi-Jukebox-RFID/issues/2398/comments
1
2024-07-11T17:29:36
2024-07-12T04:51:34Z
https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2398
2,403,698,934
2,398
true
"This is a GitHub Issue\nrepo:RPi-Jukebox-RFID\nowner:MiczFlor\nTitle : 🐛 | RPi-Jukebox-RFID V2.7(...TRUNCATED)
2,295
[-0.04586855694651604,0.004459443036466837,-0.0017267768271267414,-0.004895328544080257,0.0071795359(...TRUNCATED)
868
null
null
null
null
null
null
No_CWE
null
[ "kubernetes", "kubernetes" ]
"### What would you like to be added?\n\nthere isn't any validation in the [admission of a Validatin(...TRUNCATED)
Make ValidatingWebhookConfiguration validate rule.APIGroups
https://api.github.com/repos/kubernetes/kubernetes/issues/130006/comments
4
2025-02-06T16:39:59
2025-02-12T15:49:31Z
https://github.com/kubernetes/kubernetes/issues/130006
2,836,043,795
130,006
false
"This is a GitHub Issue\nrepo:kubernetes\nowner:kubernetes\nTitle : Make ValidatingWebhookConfigurat(...TRUNCATED)
1,278
[-0.0038058171048760414,0.012634506449103355,-0.013764147646725178,0.004313483368605375,0.0265869274(...TRUNCATED)
3,329
CVE-2023-36281
2023-08-22T19:16:36.457
"An issue in langchain v.0.0.171 allows a remote attacker to execute arbitrary code via a JSON file (...TRUNCATED)
{"cvssMetricV2":null,"cvssMetricV30":null,"cvssMetricV31":[{"cvssData":{"attackComplexity":"LOW","at(...TRUNCATED)
[{"source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"],"url":"https://aisec.today/Lang(...TRUNCATED)
[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:langchain:langchain:0.0.171:*:*:*:*:*:*:*","matchCrit(...TRUNCATED)
94
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
[ "hwchase17", "langchain" ]
"### System Info\r\n\r\nwindows 11\r\n\r\n### Who can help?\r\n\r\n_No response_\r\n\r\n### Informat(...TRUNCATED)
Template injection to arbitrary code execution
https://api.github.com/repos/langchain-ai/langchain/issues/4394/comments
4
2023-05-09T12:28:24
2023-10-10T15:15:44Z
https://github.com/langchain-ai/langchain/issues/4394
1,701,910,416
4,394
true
"This is a GitHub Issue\nrepo:langchain\nowner:hwchase17\nTitle : Template injection to arbitrary co(...TRUNCATED)
1,630
[-0.023858746513724327,-0.03996261954307556,-0.008192649111151695,0.01013918500393629,0.046810671687(...TRUNCATED)
777
CVE-2023-30300
2023-05-03T20:15:10.327
An issue in the component hang.wasm of WebAssembly 1.0 causes an infinite loop.
{"cvssMetricV2":null,"cvssMetricV30":null,"cvssMetricV31":[{"cvssData":{"attackComplexity":"LOW","at(...TRUNCATED)
[{"source":"cve@mitre.org","tags":["Exploit","Issue Tracking","Third Party Advisory"],"url":"https:/(...TRUNCATED)
[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:w3:webassembly:1.0:*:*:*:*:*:*:*","matchCriteriaId":"(...TRUNCATED)
835
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
[ "WebAssembly", "wabt" ]
"### Describe the bug\r\nCertain `hang.wasm` causes `wasm2c` an infinite loop. `wasm2c` tries to acc(...TRUNCATED)
wasm2c hangs on certain inputs and cannot finish execution for a while.
https://api.github.com/repos/WebAssembly/wabt/issues/2180/comments
5
2023-03-27T20:41:27
2023-03-31T17:02:49Z
https://github.com/WebAssembly/wabt/issues/2180
1,642,781,849
2,180
true
"This is a GitHub Issue\nrepo:wabt\nowner:WebAssembly\nTitle : wasm2c hangs on certain inputs and ca(...TRUNCATED)
2,501
[-0.03661353141069412,0.0033684016671031713,-0.002750710817053914,-0.002759741386398673,0.0427109710(...TRUNCATED)
653
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
115