cve_id stringclasses 476
values | cve_published stringclasses 476
values | cve_descriptions stringclasses 475
values | cve_metrics dict | cve_references listlengths 1 64 ⌀ | cve_configurations listlengths 1 4 ⌀ | cve_primary_cwe stringclasses 54
values | cve_tags sequencelengths 1 4 ⌀ | issue_owner_repo sequencelengths 2 2 | issue_body stringlengths 0 8.04k ⌀ | issue_title stringlengths 1 677 | issue_comments_url stringlengths 59 81 | issue_comments_count int64 0 76 | issue_created_at timestamp[ns] | issue_updated_at stringlengths 20 20 | issue_html_url stringlengths 40 62 | issue_github_id int64 128M 2.89B | issue_number int64 96 131k | label bool 2
classes | issue_msg stringlengths 120 8.18k | issue_msg_n_tokens int64 120 8.18k | issue_embedding sequencelengths 3.07k 3.07k | __index_level_0__ int64 3 4.74k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2023-34626 | 2023-06-15T16:15:09.347 | Piwigo 13.7.0 is vulnerable to SQL Injection via the "Users" function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/Piwigo/Piwigo/issues/1924"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisor... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:piwigo:piwigo:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B4B9AEE3-C9C5-4D20-BA38-9E5A2A64FABD",
"versionEndExcluding": null,
"versionEndIncluding": "13.7.0",
"versionStartExcludin... | 89 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | [
"Piwigo",
"Piwigo"
] | Access the 'Users' function and use the filter function

Observe the request on Burp Suite

Manipulate the 'order' or 'e... | SQL Injection in the "Users" function of piwigo | https://api.github.com/repos/Piwigo/Piwigo/issues/1924/comments | 0 | 2023-05-25T07:54:09 | 2023-05-29T10:27:38Z | https://github.com/Piwigo/Piwigo/issues/1924 | 1,725,285,095 | 1,924 | true | This is a GitHub Issue
repo:Piwigo
owner:Piwigo
Title : SQL Injection in the "Users" function of piwigo
Issue date:
--- start body ---
Access the 'Users' function and use the filter function

Observe the request on Burp... | 1,691 | [
-0.031218959018588066,
0.016001466661691666,
-0.0023554214276373386,
-0.010765640996396542,
0.03222692385315895,
0.008945701643824577,
0.017541415989398956,
0.014531515538692474,
0.008147728629410267,
0.016141461208462715,
-0.00422785896807909,
-0.021629279479384422,
-0.003706376301124692,
... | 729 |
null | null | null | null | null | null | No_CWE | null | [
"python",
"cpython"
] | # Bug report
### Bug description:
```python
# Add a code block here, if required
```
Pour décoder l'image à partir de la chaîne de données Base64 que vous avez fournie, je vais vous montrer les étapes à suivre en utilisant Python. Si vous avez Python installé sur votre ordinateur, vous pouvez exécuter le code suivant... | <spam/malware> | https://api.github.com/repos/python/cpython/issues/130560/comments | 0 | 2025-02-25T22:57:50 | 2025-02-25T23:00:44Z | https://github.com/python/cpython/issues/130560 | 2,879,730,535 | 130,560 | false | This is a GitHub Issue
repo:cpython
owner:python
Title : <spam/malware>
Issue date:
--- start body ---
# Bug report
### Bug description:
```python
# Add a code block here, if required
```
Pour décoder l'image à partir de la chaîne de données Base64 que vous avez fournie, je vais vous montrer les étapes à suivre en u... | 2,154 | [
-0.007851722650229931,
-0.023476436734199524,
0.0009313632035627961,
0.0057760621421039104,
0.033725906163454056,
0.007708573713898659,
0.02313287928700447,
0.03200811520218849,
0.02570956014096737,
0.05562769994139671,
0.000988622778095305,
-0.05015940964221954,
0.005500500556081533,
0.01... | 4,089 |
null | null | null | null | null | null | No_CWE | null | [
"ImageMagick",
"ImageMagick"
] | "### ImageMagick version\r\n\r\n7.1.1-38 Q16-HDRI x86_64 22398\r\n\r\n### Operating system\r\n\r\nLi(...TRUNCATED) | MNG file consumes all RAM | https://api.github.com/repos/ImageMagick/ImageMagick/issues/7832/comments | 1 | 2024-12-13T15:07:47 | 2024-12-13T18:48:52Z | https://github.com/ImageMagick/ImageMagick/issues/7832 | 2,738,606,342 | 7,832 | false | "This is a GitHub Issue\nrepo:ImageMagick\nowner:ImageMagick\nTitle : MNG file consumes all RAM\nIss(...TRUNCATED) | 696 | [-0.019289691001176834,-0.005754487589001656,-0.0012495073024183512,-0.017060840502381325,0.01951933(...TRUNCATED) | 2,547 |
null | null | null | null | null | null | No_CWE | null | [
"gpac",
"gpac"
] | "Hello, I am a graduate student specializing in static analysis of programs. Recently, while using a(...TRUNCATED) | bug report | https://api.github.com/repos/gpac/gpac/issues/2767/comments | 1 | 2024-02-28T08:07:30 | 2024-03-26T13:16:11Z | https://github.com/gpac/gpac/issues/2767 | 2,158,353,764 | 2,767 | false | "This is a GitHub Issue\nrepo:gpac\nowner:gpac\nTitle : bug report\nIssue date:\n\n--- start body --(...TRUNCATED) | 586 | [-0.024535484611988068,0.039849795401096344,-0.018409758806228638,0.00958773773163557,0.024730985984(...TRUNCATED) | 1,121 |
null | null | null | null | null | null | No_CWE | null | [
"xuxueli",
"xxl-job"
] | "我在本地启动项目(单机),ExecutorRegistryThread隔几秒中就打印“xxl-job regis(...TRUNCATED) | 程序启动后,隔几秒就打印“xxl-job registry success”,如何优化? | https://api.github.com/repos/xuxueli/xxl-job/issues/3629/comments | 2 | 2025-01-15T03:18:02 | 2025-01-15T09:14:26Z | https://github.com/xuxueli/xxl-job/issues/3629 | 2,788,742,706 | 3,629 | false | "This is a GitHub Issue\nrepo:xxl-job\nowner:xuxueli\nTitle : 程序启动后,隔几秒就打印(...TRUNCATED) | 413 | [0.023570414632558823,0.018265917897224426,-0.003974528517574072,-0.025845967233181,0.02041846700012(...TRUNCATED) | 4,212 |
null | null | null | null | null | null | No_CWE | null | [
"ImageMagick",
"ImageMagick"
] | "### ImageMagick version\r\n\r\n7.1.1-38 Q16-HDRI x86_64 22398\r\n\r\n### Operating system\r\n\r\nLi(...TRUNCATED) | Inconsistent results converting between color profiles, notably involving the Lab color space | https://api.github.com/repos/ImageMagick/ImageMagick/issues/7724/comments | 8 | 2024-10-26T12:29:32 | 2024-10-29T16:03:49Z | https://github.com/ImageMagick/ImageMagick/issues/7724 | 2,615,833,591 | 7,724 | false | "This is a GitHub Issue\nrepo:ImageMagick\nowner:ImageMagick\nTitle : Inconsistent results convertin(...TRUNCATED) | 4,785 | [0.013960670679807663,-0.026025043800473213,-0.013151474297046661,0.016363736242055893,-0.0211698692(...TRUNCATED) | 2,575 |
CVE-2024-41361 | 2024-08-29T20:15:08.953 | "RPi-Jukebox-RFID v2.7.0 was discovered to contain a remote code execution (RCE) vulnerability via h(...TRUNCATED) | {"cvssMetricV2":null,"cvssMetricV30":null,"cvssMetricV31":[{"cvssData":{"attackComplexity":"LOW","at(...TRUNCATED) | [{"source":"cve@mitre.org","tags":["Exploit","Issue Tracking"],"url":"https://github.com/MiczFlor/RP(...TRUNCATED) | [{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:sourcefabric:phoniebox:2.7.0:*:*:*:*:*:*:*","matchCri(...TRUNCATED) | 94 | [
"Exploit",
"Issue Tracking"
] | [
"MiczFlor",
"RPi-Jukebox-RFID"
] | "### Version\n\nv2.7.0\n\n### Branch\n\nreleased \n\n### OS\n\nubuntu 22\n\n### Pi model\n\nunknown\(...TRUNCATED) | 🐛 | RPi-Jukebox-RFID V2.7_RCE_3 | https://api.github.com/repos/MiczFlor/RPi-Jukebox-RFID/issues/2398/comments | 1 | 2024-07-11T17:29:36 | 2024-07-12T04:51:34Z | https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2398 | 2,403,698,934 | 2,398 | true | "This is a GitHub Issue\nrepo:RPi-Jukebox-RFID\nowner:MiczFlor\nTitle : 🐛 | RPi-Jukebox-RFID V2.7(...TRUNCATED) | 2,295 | [-0.04586855694651604,0.004459443036466837,-0.0017267768271267414,-0.004895328544080257,0.0071795359(...TRUNCATED) | 868 |
null | null | null | null | null | null | No_CWE | null | [
"kubernetes",
"kubernetes"
] | "### What would you like to be added?\n\nthere isn't any validation in the [admission of a Validatin(...TRUNCATED) | Make ValidatingWebhookConfiguration validate rule.APIGroups | https://api.github.com/repos/kubernetes/kubernetes/issues/130006/comments | 4 | 2025-02-06T16:39:59 | 2025-02-12T15:49:31Z | https://github.com/kubernetes/kubernetes/issues/130006 | 2,836,043,795 | 130,006 | false | "This is a GitHub Issue\nrepo:kubernetes\nowner:kubernetes\nTitle : Make ValidatingWebhookConfigurat(...TRUNCATED) | 1,278 | [-0.0038058171048760414,0.012634506449103355,-0.013764147646725178,0.004313483368605375,0.0265869274(...TRUNCATED) | 3,329 |
CVE-2023-36281 | 2023-08-22T19:16:36.457 | "An issue in langchain v.0.0.171 allows a remote attacker to execute arbitrary code via a JSON file (...TRUNCATED) | {"cvssMetricV2":null,"cvssMetricV30":null,"cvssMetricV31":[{"cvssData":{"attackComplexity":"LOW","at(...TRUNCATED) | [{"source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"],"url":"https://aisec.today/Lang(...TRUNCATED) | [{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:langchain:langchain:0.0.171:*:*:*:*:*:*:*","matchCrit(...TRUNCATED) | 94 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | [
"hwchase17",
"langchain"
] | "### System Info\r\n\r\nwindows 11\r\n\r\n### Who can help?\r\n\r\n_No response_\r\n\r\n### Informat(...TRUNCATED) | Template injection to arbitrary code execution | https://api.github.com/repos/langchain-ai/langchain/issues/4394/comments | 4 | 2023-05-09T12:28:24 | 2023-10-10T15:15:44Z | https://github.com/langchain-ai/langchain/issues/4394 | 1,701,910,416 | 4,394 | true | "This is a GitHub Issue\nrepo:langchain\nowner:hwchase17\nTitle : Template injection to arbitrary co(...TRUNCATED) | 1,630 | [-0.023858746513724327,-0.03996261954307556,-0.008192649111151695,0.01013918500393629,0.046810671687(...TRUNCATED) | 777 |
CVE-2023-30300 | 2023-05-03T20:15:10.327 | An issue in the component hang.wasm of WebAssembly 1.0 causes an infinite loop. | {"cvssMetricV2":null,"cvssMetricV30":null,"cvssMetricV31":[{"cvssData":{"attackComplexity":"LOW","at(...TRUNCATED) | [{"source":"cve@mitre.org","tags":["Exploit","Issue Tracking","Third Party Advisory"],"url":"https:/(...TRUNCATED) | [{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:w3:webassembly:1.0:*:*:*:*:*:*:*","matchCriteriaId":"(...TRUNCATED) | 835 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | [
"WebAssembly",
"wabt"
] | "### Describe the bug\r\nCertain `hang.wasm` causes `wasm2c` an infinite loop. `wasm2c` tries to acc(...TRUNCATED) | wasm2c hangs on certain inputs and cannot finish execution for a while. | https://api.github.com/repos/WebAssembly/wabt/issues/2180/comments | 5 | 2023-03-27T20:41:27 | 2023-03-31T17:02:49Z | https://github.com/WebAssembly/wabt/issues/2180 | 1,642,781,849 | 2,180 | true | "This is a GitHub Issue\nrepo:wabt\nowner:WebAssembly\nTitle : wasm2c hangs on certain inputs and ca(...TRUNCATED) | 2,501 | [-0.03661353141069412,0.0033684016671031713,-0.002750710817053914,-0.002759741386398673,0.0427109710(...TRUNCATED) | 653 |
End of preview. Expand in Data Studio
README.md exists but content is empty.
- Downloads last month
- 115