cve_id stringclasses 452
values | cve_published stringclasses 452
values | cve_descriptions stringclasses 450
values | cve_metrics dict | cve_references listlengths 1 64 ⌀ | cve_configurations listlengths 1 5 ⌀ | cve_primary_cwe stringclasses 33
values | cve_tags listlengths 1 4 ⌀ | issue_owner_repo listlengths 2 2 | issue_body stringlengths 0 8.04k ⌀ | issue_title stringlengths 1 677 | issue_comments_url stringlengths 59 81 | issue_comments_count int64 0 76 | issue_created_at timestamp[ns] | issue_updated_at stringlengths 20 20 | issue_html_url stringlengths 40 62 | issue_github_id int64 128M 2.89B | issue_number int64 94 131k | label bool 2
classes | issue_msg stringlengths 119 8.18k | issue_msg_n_tokens int64 119 8.18k | issue_embedding listlengths 3.07k 3.07k | __index_level_0__ int64 4 4.74k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
null | null | null | null | null | null | No_CWE | null | [
"python",
"cpython"
] | # Bug report
I enabled `test_concurrent_futures` in the thread sanitizer job yesterday in:
* https://github.com/python/cpython/pull/129826
Unfortunately, this is causing fairly frequent failures in the TSAN job, especially for the default (GIL-enabled) build, which I hadn't tested sufficiently with TSAN.
I'll tempo... | `test_concurrent_futures` TSAN failures | https://api.github.com/repos/python/cpython/issues/130605/comments | 0 | 2025-02-26T21:00:12 | 2025-02-27T20:41:28Z | https://github.com/python/cpython/issues/130605 | 2,882,804,940 | 130,605 | false | This is a GitHub Issue
repo:cpython
owner:python
Title : `test_concurrent_futures` TSAN failures
Issue date:
--- start body ---
# Bug report
I enabled `test_concurrent_futures` in the thread sanitizer job yesterday in:
* https://github.com/python/cpython/pull/129826
Unfortunately, this is causing fairly frequent fa... | 2,415 | [
0.0035275097470730543,
-0.014683842658996582,
-0.01664721965789795,
0.011918524280190468,
0.005848649423569441,
0.004030452109873295,
0.00016516298637725413,
0.02545475959777832,
-0.0030971569940447807,
-0.008095471188426018,
-0.032105352729558945,
0.00885593332350254,
0.012810339219868183,
... | 4,078 |
null | null | null | null | null | null | No_CWE | null | [
"jerryscript-project",
"jerryscript"
] | Currently in node_api_internal.h
```
#define AS_JERRY_VALUE(nvalue) (jerry_value_t)(uintptr_t) nvalue
jerry_value_t AS_JERRY_OBJECT(napi_value nvalue);
```
But in https://github.com/nodejs/node-addon-api/blob/main/napi.h, they , when the value of
nvalue is nullptr means invalid value(empty value), not `number 0`... | in jerry jerry_value_t == 0 means number '0' that's incosistence with nullptr in NAPI | https://api.github.com/repos/jerryscript-project/jerryscript/issues/4578/comments | 0 | 2021-02-08T14:56:27 | 2021-02-17T13:30:02Z | https://github.com/jerryscript-project/jerryscript/issues/4578 | 803,639,908 | 4,578 | false | This is a GitHub Issue
repo:jerryscript
owner:jerryscript-project
Title : in jerry jerry_value_t == 0 means number '0' that's incosistence with nullptr in NAPI
Issue date:
--- start body ---
Currently in node_api_internal.h
```
#define AS_JERRY_VALUE(nvalue) (jerry_value_t)(uintptr_t) nvalue
jerry_value_t AS_JERRY_... | 935 | [
-0.0351322665810585,
0.0009053507819771767,
-0.011705979704856873,
0.029601657763123512,
0.013145944103598595,
0.004087063018232584,
0.01653451658785343,
0.038972172886133194,
-0.02553250454366207,
0.0005126739270053804,
-0.00508285965770483,
0.022136766463518143,
-0.003710953053086996,
-0... | 2,445 |
null | null | null | null | null | null | No_CWE | null | [
"kubernetes",
"kubernetes"
] | ### What happened?
Recently, we encountered an intermittent issue that occurs approximately once a week. The error event is as follows:
```
...
Status: Failed
Reason: UnexpectedAdmissionError
Message: Pod Allocate failed due to requested number of devices unavailable for nvidia.com/gpu... | Pod Allocate failed due to requested number of devices unavailable for nvidia.com/gpu. Requested:1, Available: 0, which is unexpected | https://api.github.com/repos/kubernetes/kubernetes/issues/130145/comments | 9 | 2025-02-13T16:34:07 | 2025-03-05T13:45:07Z | https://github.com/kubernetes/kubernetes/issues/130145 | 2,851,554,045 | 130,145 | false | This is a GitHub Issue
repo:kubernetes
owner:kubernetes
Title : Pod Allocate failed due to requested number of devices unavailable for nvidia.com/gpu. Requested:1, Available: 0, which is unexpected
Issue date:
--- start body ---
### What happened?
Recently, we encountered an intermittent issue that occurs approximate... | 3,244 | [
-0.00780762592330575,
-0.028999753296375275,
-0.008195889182388783,
-0.010454877279698849,
0.015544658526778221,
-0.01802954450249672,
-0.048822369426488876,
0.03922167420387268,
-0.0012998003512620926,
-0.0062969280406832695,
-0.007899397052824497,
-0.012382076121866703,
-0.0160811673849821... | 3,304 |
CVE-2020-23303 | 2021-06-10T23:15:07.780 | There is a heap-buffer-overflow at jmem-poolman.c:165 in jmem_pools_collect_empty in JerryScript 2.2.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/3749"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | 787 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
bd1c4df
###### Build platform
Ubuntu 16.04.6 LTS (Linux 4.15.0-99-generic x86_64)
###### Build steps
python ./tools/build.py --clean --debug --compile-flag=-fsanitize=address --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer --compile-flag=-fno-common --lto=off --error-me... | heap-buffer-overflow in the jmem_pools_collect_empty | https://api.github.com/repos/jerryscript-project/jerryscript/issues/3749/comments | 0 | 2020-05-17T04:04:34 | 2020-05-20T10:10:06Z | https://github.com/jerryscript-project/jerryscript/issues/3749 | 619,604,019 | 3,749 | true | This is a GitHub Issue
repo:jerryscript
owner:jerryscript-project
Title : heap-buffer-overflow in the jmem_pools_collect_empty
Issue date:
--- start body ---
###### JerryScript revision
bd1c4df
###### Build platform
Ubuntu 16.04.6 LTS (Linux 4.15.0-99-generic x86_64)
###### Build steps
python ./tools/build.... | 7,122 | [
-0.04077741876244545,
-0.0037698636297136545,
-0.00804432574659586,
0.0013949592830613256,
0.02362106740474701,
-0.009660504758358002,
-0.017536630854010582,
0.03162151575088501,
-0.03638960421085358,
0.026985056698322296,
-0.016761450096964836,
-0.0007957483758218586,
-0.010267484933137894,... | 237 |
null | null | null | null | null | null | No_CWE | null | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough info... | How to use the filter ffavf of ffmpeg through mp4box? | https://api.github.com/repos/gpac/gpac/issues/2591/comments | 1 | 2023-09-07T10:43:20 | 2023-09-13T11:06:50Z | https://github.com/gpac/gpac/issues/2591 | 1,885,636,865 | 2,591 | false | This is a GitHub Issue
repo:gpac
owner:gpac
Title : How to use the filter ffavf of ffmpeg through mp4box?
Issue date:
--- start body ---
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [x... | 2,422 | [
-0.02173656038939953,
0.03356713801622391,
-0.012177285738289356,
0.00032680906588211656,
0.014413207769393921,
-0.009594653733074665,
-0.019769515842199326,
0.03625590354204178,
-0.04239761456847191,
0.03351053223013878,
-0.01923176273703575,
-0.005833917763084173,
0.0021297866478562355,
... | 1,248 |
null | null | null | null | null | null | No_CWE | null | [
"gpac",
"gpac"
] |
[poc.zip](https://github.com/gpac/gpac/files/7989436/poc.zip)
```
Description
Null Pointer Dereference in afrt_box_read
gdb output
pwndbg> r -bt poc
Starting program: /run/shm/gpac/bin/gcc/MP4Box -bt poc
ERROR: Could not find ELF base!
[Thread debugging using libthread_db enabled]
Using host libthread_... | NULL Pointer Dereference | https://api.github.com/repos/gpac/gpac/issues/2093/comments | 0 | 2022-02-02T19:21:15 | 2022-02-04T09:04:41Z | https://github.com/gpac/gpac/issues/2093 | 1,122,297,501 | 2,093 | false | This is a GitHub Issue
repo:gpac
owner:gpac
Title : NULL Pointer Dereference
Issue date:
--- start body ---
[poc.zip](https://github.com/gpac/gpac/files/7989436/poc.zip)
```
Description
Null Pointer Dereference in afrt_box_read
gdb output
pwndbg> r -bt poc
Starting program: /run/shm/gpac/bin/gcc/MP4Box -... | 4,809 | [
-0.01847073808312416,
0.029684605076909065,
-0.008199693635106087,
0.030827417969703674,
0.02105635590851307,
0.01645652763545513,
-0.018427882343530655,
0.02965603396296501,
0.012142403051257133,
0.01565655693411827,
-0.01614225283265114,
0.025013349950313568,
0.023699114099144936,
-0.003... | 1,640 |
CVE-2023-48090 | 2023-11-20T15:15:09.863 | GPAC 2.3-DEV-rev617-g671976fcc-master is vulnerable to memory leaks in extract_attributes media_tools/m3u8.c:329. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2680"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev617-g671976fcc-master:*:*:*:*:*:*:*",
"matchCriteriaId": "F540C691-D615-4A9B-8DD6-69B8488E3BA1",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | 401 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | [
"gpac",
"gpac"
] | 1.Version
./MP4Box -version
MP4Box - GPAC version 2.3-DEV-rev617-g671976fcc-master
(c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io/
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC: https://doi.org/10.1145/1291233.1291452
GPAC Configu... | memory leaks in extract_attributes media_tools/m3u8.c:329 | https://api.github.com/repos/gpac/gpac/issues/2680/comments | 0 | 2023-11-07T07:24:45 | 2023-12-04T10:07:50Z | https://github.com/gpac/gpac/issues/2680 | 1,980,712,658 | 2,680 | true | This is a GitHub Issue
repo:gpac
owner:gpac
Title : memory leaks in extract_attributes media_tools/m3u8.c:329
Issue date:
--- start body ---
1.Version
./MP4Box -version
MP4Box - GPAC version 2.3-DEV-rev617-g671976fcc-master
(c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io/
Please cite ou... | 2,781 | [
-0.02301914617419243,
0.0032703750766813755,
-0.015903301537036896,
-0.002214116742834449,
0.004021832719445229,
0.018265025690197945,
-0.02728251926600933,
0.036315347999334335,
-0.01385596115142107,
-0.004213531035929918,
-0.03284944221377373,
-0.00006919114821357653,
0.019108498468995094,... | 818 |
null | null | null | null | null | null | No_CWE | null | [
"dromara",
"hutool"
] | 【问题描述】:
如果同时存在下面2个场景:
(1)使用CsvUtil用于将data导出csv文件,这时我们通常会使用注解来标记bean,用于csv文件标题,比如
@Alias("支付单号") String payNo
(2)同时我们使用BeanUtil.copyProperties来复制bean属性,此时字段属性名称会被注解所取代,即字段名称将从【payNo】变成【支付单号】,导致无法进行属性copy。
-
期望提供一个可以在复制属性时可以忽略注解@Alias的方式。 | 5.x关于@Alias注解的使用冲突问题 | https://api.github.com/repos/chinabugotech/hutool/issues/3878/comments | 1 | 2025-02-28T03:28:06 | 2025-03-05T07:20:29Z | https://github.com/chinabugotech/hutool/issues/3878 | 2,886,100,327 | 3,878 | false | This is a GitHub Issue
repo:hutool
owner:dromara
Title : 5.x关于@Alias注解的使用冲突问题
Issue date:
--- start body ---
【问题描述】:
如果同时存在下面2个场景:
(1)使用CsvUtil用于将data导出csv文件,这时我们通常会使用注解来标记bean,用于csv文件标题,比如
@Alias("支付单号") String payNo
(2)同时我们使用BeanUtil.copyProperties来复制bean属性,此时字段属性名称会被注解所取代,即字段名称将从【payNo】变成【支付单号】,导致无法进行属性copy。
... | 370 | [
-0.03264721482992172,
-0.02022841013967991,
-0.0181458480656147,
0.023290999233722687,
0.020458104088902473,
0.002283544046804309,
-0.014692777767777443,
0.04808266833424568,
-0.00762967811897397,
-0.015910156071186066,
-0.008268994279205799,
-0.006787465885281563,
0.02009059302508831,
0.0... | 4,117 |
null | null | null | null | null | null | No_CWE | null | [
"ChurchCRM",
"CRM"
] |
## ChurchCRM 5.13.0 - Path Disclosure in Forgot Password Reset Request
#### **Severity:**
🟢 **Low** (CWE-209: Information Exposure Through an Error Message)
#### **Description**
A vulnerability exists in **ChurchCRM** that allows unauthenticated attackers to trigger an error message disclosing sensitive fil... | Bug: ChurchCRM 5.13.0 - Path Disclosure in Forgot Password Reset Request | https://api.github.com/repos/ChurchCRM/CRM/issues/7240/comments | 1 | 2025-02-02T12:20:37 | 2025-02-03T01:33:24Z | https://github.com/ChurchCRM/CRM/issues/7240 | 2,825,772,815 | 7,240 | false | This is a GitHub Issue
repo:CRM
owner:ChurchCRM
Title : Bug: ChurchCRM 5.13.0 - Path Disclosure in Forgot Password Reset Request
Issue date:
--- start body ---
## ChurchCRM 5.13.0 - Path Disclosure in Forgot Password Reset Request
#### **Severity:**
🟢 **Low** (CWE-209: Information Exposure Through an Error Messa... | 3,177 | [
-0.04730427265167236,
0.02948736771941185,
-0.00982652883976698,
0.013918970711529255,
0.02581506222486496,
0.01887502707540989,
0.02659309282898903,
0.04304066300392151,
-0.03301962837576866,
0.03669193387031555,
0.0016251117922365665,
0.010697923600673676,
-0.01587182842195034,
-0.004244... | 3,977 |
null | null | null | null | null | null | No_CWE | null | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough info... | Tile dropping with -2 option does not work, on_rate_adaptation function is not called | https://api.github.com/repos/gpac/gpac/issues/2266/comments | 1 | 2022-09-22T13:48:51 | 2022-09-28T16:43:24Z | https://github.com/gpac/gpac/issues/2266 | 1,382,486,828 | 2,266 | false | This is a GitHub Issue
repo:gpac
owner:gpac
Title : Tile dropping with -2 option does not work, on_rate_adaptation function is not called
Issue date:
--- start body ---
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar i... | 4,341 | [
-0.009120594710111618,
0.026928892359137535,
-0.014554141089320183,
0.0032634863164275885,
0.004978262819349766,
0.014770586974918842,
-0.009687833487987518,
0.04352807626128197,
-0.03185490891337395,
0.014098857529461384,
-0.00785177294164896,
-0.016464838758111,
0.044334154576063156,
-0.... | 1,495 |
CVE-2021-46345 | 2022-01-20T22:15:08.970 | There is an Assertion 'cesu8_cursor_p == cesu8_end_p' failed at /jerry-core/lit/lit-strings.c in JerryScript 3.0.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4920"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | 617 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: [a6ab5e9](https://github.com/jerryscript-project/jerryscript/commit/a6ab5e9abed70cdedf9f4e9c1dc379eb762ebf64)
Version: v3.0.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 4.19.128-microsoft-standard x86_64)
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
... | Assertion 'cesu8_cursor_p == cesu8_end_p' failed at /jerryscript/jerry-core/lit/lit-strings.c(lit_convert_cesu8_string_to_utf8_string):868. | https://api.github.com/repos/jerryscript-project/jerryscript/issues/4920/comments | 0 | 2022-01-04T06:01:01 | 2022-01-14T09:03:47Z | https://github.com/jerryscript-project/jerryscript/issues/4920 | 1,093,037,283 | 4,920 | true | This is a GitHub Issue
repo:jerryscript
owner:jerryscript-project
Title : Assertion 'cesu8_cursor_p == cesu8_end_p' failed at /jerryscript/jerry-core/lit/lit-strings.c(lit_convert_cesu8_string_to_utf8_string):868.
Issue date:
--- start body ---
###### JerryScript revision
Commit: [a6ab5e9](https://github.com/jerrys... | 1,505 | [
0.009151884354650974,
0.011480513960123062,
-0.008213040418922901,
0.010349465534090996,
0.012086696922779083,
-0.00351512199267745,
-0.0050638457760214806,
0.036577966064214706,
-0.03622312843799591,
-0.010800406336784363,
-0.007200270891189575,
-0.00127889821305871,
0.0013066199608147144,
... | 397 |
CVE-2020-24187 | 2023-08-11T14:15:10.237 | An issue was discovered in ecma-helpers.c in jerryscript version 2.3.0, allows local attackers to cause a denial of service (DoS) (Null Pointer Dereference). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Aurorainfinity/Poc/tree/master/jerryscript/NULL-dereference-ecma_get_lex_env_type"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:2.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BCC6C843-EE98-4852-8D03-7FC19D2E821C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | 476 | [
"Vendor Advisory"
] | [
"jerryscript-project",
"jerryscript"
] |
###### JerryScript revision
commit : https://github.com/jerryscript-project/jerryscript/commit/227007eda75d86db1bb32ea380cf9650122d6920
version : v2.3.0
###### Build platform
Ubuntu 16.04.1 LTS (4.15.0-45-generic x86_64)
###### Build steps
```
python tools/build.py --profile=es2015-subset --lto=off -... | Memory corruption in in ecma_get_lex_env_type (jerryscript/jerry-core/ecma/base/ecma-helpers.c:276) | https://api.github.com/repos/jerryscript-project/jerryscript/issues/4076/comments | 0 | 2020-07-28T06:48:28 | 2020-07-31T15:19:06Z | https://github.com/jerryscript-project/jerryscript/issues/4076 | 666,814,219 | 4,076 | true | This is a GitHub Issue
repo:jerryscript
owner:jerryscript-project
Title : Memory corruption in in ecma_get_lex_env_type (jerryscript/jerry-core/ecma/base/ecma-helpers.c:276)
Issue date:
--- start body ---
###### JerryScript revision
commit : https://github.com/jerryscript-project/jerryscript/commit/227007eda75d86... | 5,875 | [
0.005572698079049587,
-0.025887126103043556,
-0.007172418758273125,
0.012570969760417938,
0.027231702581048012,
0.007212918251752853,
-0.009039434604346752,
0.023197976872324944,
-0.040272463113069534,
0.017220284789800644,
-0.001502522500231862,
0.03074703738093376,
0.017366083338856697,
... | 768 |
CVE-2021-44994 | 2022-01-25T01:15:07.773 | There is an Assertion ''JERRY_CONTEXT (jmem_heap_allocated_size) == 0'' failed at /jerry-core/jmem/jmem-heap.c in Jerryscript 3.0.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4894"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | 617 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | [
"jerryscript-project",
"jerryscript"
] | ## JerryScript commit hash
55acdf2048b390d0f56f12e64dbfb2559f0e70ad
## Build platform
Ubuntu 20.04 LTS
## Build steps
```
./tools/build.py --clean --debug --compile-flag=-fsanitize=address \
--compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer \
--compile-flag=-fno-common --compile-flag=-g \
--strip=... | Assertion 'JERRY_CONTEXT (jmem_heap_allocated_size) == 0' failed at /home/sakura/jerryscript/jerry-core/jmem/jmem-heap.c(jmem_heap_finalize):108. | https://api.github.com/repos/jerryscript-project/jerryscript/issues/4894/comments | 1 | 2021-12-09T14:53:08 | 2022-01-14T09:05:39Z | https://github.com/jerryscript-project/jerryscript/issues/4894 | 1,075,663,454 | 4,894 | true | This is a GitHub Issue
repo:jerryscript
owner:jerryscript-project
Title : Assertion 'JERRY_CONTEXT (jmem_heap_allocated_size) == 0' failed at /home/sakura/jerryscript/jerry-core/jmem/jmem-heap.c(jmem_heap_finalize):108.
Issue date:
--- start body ---
## JerryScript commit hash
55acdf2048b390d0f56f12e64dbfb2559f0e70ad... | 1,047 | [
-0.002813184168189764,
-0.010294733569025993,
-0.010659687221050262,
-0.00452010240405798,
0.029622068628668785,
-0.02016368694603443,
0.0018000577110797167,
0.043611958622932434,
-0.0301238801330328,
0.012476852163672447,
-0.006375283468514681,
-0.002607897622510791,
0.009237888269126415,
... | 421 |
null | null | null | null | null | null | No_CWE | null | [
"openlink",
"virtuoso-opensource"
] | Virtuoso 7.2.12 crashes at `dc_append_bytes`. It can also be reproduced on the latest commit 2bbd7e0.
PoC:
```sql
SELECT 1 FROM (SELECT 1 x) AS x GROUP BY REPEAT(REPEAT('1', 70), 100000)
```
GDB backtrace (on commit 2bbd7e0):
```
Thread 8 "virtuoso-t" received signal SIGSEGV, Segmentation fault.
[Switching ... | Virtuoso 7.2.12 crashes at `dc_append_bytes` | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1285/comments | 0 | 2024-04-30T18:58:53 | 2024-05-03T10:57:41Z | https://github.com/openlink/virtuoso-opensource/issues/1285 | 2,272,249,561 | 1,285 | false | This is a GitHub Issue
repo:virtuoso-opensource
owner:openlink
Title : Virtuoso 7.2.12 crashes at `dc_append_bytes`
Issue date:
--- start body ---
Virtuoso 7.2.12 crashes at `dc_append_bytes`. It can also be reproduced on the latest commit 2bbd7e0.
PoC:
```sql
SELECT 1 FROM (SELECT 1 x) AS x GROUP BY REPEAT(REPEA... | 3,240 | [
-0.009764259681105614,
0.0022510315757244825,
-0.012334892526268959,
0.00972970761358738,
0.051771994680166245,
0.02974194847047329,
0.0021076425909996033,
0.040798433125019073,
0.011768247000873089,
0.035629525780677795,
-0.003356680041179061,
0.004077079240232706,
0.016833500936627388,
0... | 3,674 |
null | null | null | null | null | null | No_CWE | null | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_GCC=gcc
$(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP... | SEGV src/mjs_exec.c:501 in getprop_builtin_foreign | https://api.github.com/repos/cesanta/mjs/issues/204/comments | 0 | 2021-12-31T07:36:20 | 2021-12-31T07:36:20Z | https://github.com/cesanta/mjs/issues/204 | 1,091,458,500 | 204 | false | This is a GitHub Issue
repo:mjs
owner:cesanta
Title : SEGV src/mjs_exec.c:501 in getprop_builtin_foreign
Issue date:
--- start body ---
###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.... | 1,730 | [
-0.013899942860007286,
-0.0027609996031969786,
0.0015675413887947798,
0.013861964456737041,
0.028741739690303802,
0.018502874299883842,
-0.013740435242652893,
0.036063894629478455,
-0.040773164480924606,
0.008522260002791882,
-0.034028276801109314,
0.01794080063700676,
0.012198529206216335,
... | 3,510 |
null | null | null | null | null | null | No_CWE | null | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_GCC=gcc
$(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(T... | SEGV src/mjs_gc.c:406 in gc_compact_strings | https://api.github.com/repos/cesanta/mjs/issues/216/comments | 0 | 2021-12-31T07:56:05 | 2022-01-12T02:21:15Z | https://github.com/cesanta/mjs/issues/216 | 1,091,463,608 | 216 | false | This is a GitHub Issue
repo:mjs
owner:cesanta
Title : SEGV src/mjs_gc.c:406 in gc_compact_strings
Issue date:
--- start body ---
###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-... | 1,982 | [
-0.004069536458700895,
0.03122841939330101,
-0.000563369132578373,
0.018933888524770737,
0.0249483659863472,
0.005784052889794111,
-0.017121734097599983,
0.04680357128381729,
-0.04820955544710159,
-0.0012155884178355336,
-0.039617445319890976,
0.009716896340250969,
0.005331014283001423,
0.... | 3,498 |
null | null | null | null | null | null | No_CWE | null | [
"cesanta",
"mjs"
] | ### Enviroment
Ubuntu20.04, 64bit
### Step to reproduce
1. version
`9eae0e6`
3. compile with ASAN
```
`gcc -DMJS_MAIN mjs.c -fsanitize=address -ldl -g -o mjs-bin`
```
4. command for reproducing the error
```
mjs-bin -f poc
```
Download poc:
[mjs_invalid-memory-read_mjs6275.zip](https://github.com/ces... | DEADLYSIGNAL on mjs.c:6275 | https://api.github.com/repos/cesanta/mjs/issues/295/comments | 0 | 2024-10-29T02:53:00 | 2024-10-29T02:53:00Z | https://github.com/cesanta/mjs/issues/295 | 2,619,987,601 | 295 | false | This is a GitHub Issue
repo:mjs
owner:cesanta
Title : DEADLYSIGNAL on mjs.c:6275
Issue date:
--- start body ---
### Enviroment
Ubuntu20.04, 64bit
### Step to reproduce
1. version
`9eae0e6`
3. compile with ASAN
```
`gcc -DMJS_MAIN mjs.c -fsanitize=address -ldl -g -o mjs-bin`
```
4. command for reproducing... | 2,120 | [
0.0018804932478815317,
-0.0003036612761206925,
-0.004543885588645935,
0.0076332674361765385,
0.04071075841784477,
0.03466247767210007,
-0.022228198125958443,
0.045868683606386185,
-0.028230424970388412,
-0.011873971670866013,
-0.02299574576318264,
-0.0005886135622859001,
-0.00169915996957570... | 3,431 |
null | null | null | null | null | null | No_CWE | null | [
"python",
"cpython"
] | # Feature or enhancement
### Proposal:
This suggestion arose from there not currently being a way in python to test for `PyRefTracer_DESTROY` events (that I could find), specifically from there not being a way to add a regression test for: https://github.com/python/cpython/issues/130382
Add some simple code to `trac... | Add a way to trace `PyRefTracer_DESTROY` events in `tracemalloc` | https://api.github.com/repos/python/cpython/issues/130695/comments | 0 | 2025-02-28T17:09:06 | 2025-02-28T17:24:27Z | https://github.com/python/cpython/issues/130695 | 2,887,672,510 | 130,695 | false | This is a GitHub Issue
repo:cpython
owner:python
Title : Add a way to trace `PyRefTracer_DESTROY` events in `tracemalloc`
Issue date:
--- start body ---
# Feature or enhancement
### Proposal:
This suggestion arose from there not currently being a way in python to test for `PyRefTracer_DESTROY` events (that I could f... | 999 | [
-0.016095558181405067,
0.015616930089890957,
-0.02670741267502308,
0.002712792018428445,
-0.020348504185676575,
0.01039305329322815,
0.035254333168268204,
0.031835563480854034,
-0.007254624739289284,
0.012943454086780548,
-0.03716884180903435,
0.04009530693292618,
0.005063194781541824,
0.0... | 4,055 |
null | null | null | null | null | null | No_CWE | null | [
"python",
"cpython"
] | # Feature or enhancement
### Proposal:
In current implementation of `tk.OptionMenu` and `ttk.OptionMenu`, we can not specify name to them since adding additional `kwargs` raises `unknown option` error
Since after initialization of widget `name` cannot be changed, hence we cannot specify custom name such as `games_op... | add ability to specify name for `tk.OptionMenu` and `ttk.OptionMenu` | https://api.github.com/repos/python/cpython/issues/130482/comments | 4 | 2025-02-23T12:14:20 | 2025-02-24T15:52:29Z | https://github.com/python/cpython/issues/130482 | 2,873,149,423 | 130,482 | false | This is a GitHub Issue
repo:cpython
owner:python
Title : add ability to specify name for `tk.OptionMenu` and `ttk.OptionMenu`
Issue date:
--- start body ---
# Feature or enhancement
### Proposal:
In current implementation of `tk.OptionMenu` and `ttk.OptionMenu`, we can not specify name to them since adding additiona... | 927 | [
-0.03579917922616005,
0.011706576682627201,
-0.015582779422402382,
0.021630991250276566,
0.03484126925468445,
0.03896251693367958,
0.024883437901735306,
0.022076532244682312,
-0.016017181798815727,
-0.01975972205400467,
-0.026509659364819527,
0.010397801175713539,
-0.008209084160625935,
0.... | 4,110 |
null | null | null | null | null | null | No_CWE | null | [
"gpac",
"gpac"
] | Hello,
I am trying to use Kvazaar as a GPAC filter, but I cannot make it work.
I've compiled ffmpeg with following commands:
sudo apt-get update
sudo apt-get install ffmpeg
moved to ffmpeg folder
./configure --enable-libkvazaar
make
make install
I've installed gpac:
downloaded source code
moved to ... | Gpac with kvazaar not working | https://api.github.com/repos/gpac/gpac/issues/1759/comments | 14 | 2021-04-24T09:28:26 | 2021-05-12T15:33:09Z | https://github.com/gpac/gpac/issues/1759 | 866,703,645 | 1,759 | false | This is a GitHub Issue
repo:gpac
owner:gpac
Title : Gpac with kvazaar not working
Issue date:
--- start body ---
Hello,
I am trying to use Kvazaar as a GPAC filter, but I cannot make it work.
I've compiled ffmpeg with following commands:
sudo apt-get update
sudo apt-get install ffmpeg
moved to ffmpeg folder
... | 3,789 | [
-0.021506626158952713,
0.05664383992552757,
-0.012311283499002457,
0.010163272731006145,
0.0026717542205005884,
-0.008678228594362736,
-0.02403915673494339,
0.01703823357820511,
-0.04105087369680405,
0.04712364450097084,
-0.0187221672385931,
-0.02020721137523651,
0.0024115398991853,
0.0208... | 1,857 |
null | null | null | null | null | null | No_CWE | null | [
"ImageMagick",
"ImageMagick"
] |
### ImageMagick version
6.9.10.97
### Operating system
Linux
### Operating system, version and so on
Amazon Linux 2
### Description
I am facing Segmentation fault when multiple images are being resized using `gm` npm module v1.25.0 which internally uses `ImageMagick` module.
Following is the s... | Segmentation fault with `gm` npm module and specific kernel of aws machine | https://api.github.com/repos/ImageMagick/ImageMagick/issues/7092/comments | 4 | 2024-02-07T12:20:19 | 2024-02-12T19:20:49Z | https://github.com/ImageMagick/ImageMagick/issues/7092 | 2,122,910,614 | 7,092 | false | This is a GitHub Issue
repo:ImageMagick
owner:ImageMagick
Title : Segmentation fault with `gm` npm module and specific kernel of aws machine
Issue date:
--- start body ---
### ImageMagick version
6.9.10.97
### Operating system
Linux
### Operating system, version and so on
Amazon Linux 2
### Descrip... | 2,251 | [
-0.01650690659880638,
-0.0011187217896804214,
-0.007249931804835796,
0.013585088774561882,
0.026405589655041695,
-0.0012859753333032131,
-0.026542121544480324,
0.03732827305793762,
-0.01698477379977703,
0.039403583854436874,
-0.004717234056442976,
-0.02200920879840851,
0.013960556127130985,
... | 2,771 |
null | null | null | null | null | null | No_CWE | null | [
"axiomatic-systems",
"Bento4"
] | I have read all the documentation for a long time but I do not understand how I could encrypt my video
could you make a clear example | use of bento | https://api.github.com/repos/axiomatic-systems/Bento4/issues/618/comments | 0 | 2021-06-23T01:45:00 | 2021-06-23T01:45:00Z | https://github.com/axiomatic-systems/Bento4/issues/618 | 927,774,997 | 618 | false | This is a GitHub Issue
repo:Bento4
owner:axiomatic-systems
Title : use of bento
Issue date:
--- start body ---
I have read all the documentation for a long time but I do not understand how I could encrypt my video
could you make a clear example
--- end body ---
| 266 | [
-0.01321040466427803,
0.023687103763222694,
-0.014547215774655342,
-0.009613028727471828,
0.03340527415275574,
0.005170757882297039,
0.020217400044202805,
0.04734416678547859,
-0.05245108902454376,
0.06518834829330444,
0.01697300374507904,
-0.0013903218787163496,
-0.004735167603939772,
0.0... | 2,184 |
null | null | null | null | null | null | No_CWE | null | [
"axiomatic-systems",
"Bento4"
] | Hi,
I'm trying to extract the HEVC elementary stream from a DASH/HLS fMP4 segment so I can inspect it using https://github.com/virinext/hevcesbrowser for debugging purposes.
For this I need to extract the payload of the `mdat` box of the segment. But it looks like that `mp42hevc` is not capable of doing this?
``... | How to extract ES from fMP4 segments | https://api.github.com/repos/axiomatic-systems/Bento4/issues/634/comments | 0 | 2021-08-06T09:33:09 | 2021-08-06T09:37:08Z | https://github.com/axiomatic-systems/Bento4/issues/634 | 962,570,792 | 634 | false | This is a GitHub Issue
repo:Bento4
owner:axiomatic-systems
Title : How to extract ES from fMP4 segments
Issue date:
--- start body ---
Hi,
I'm trying to extract the HEVC elementary stream from a DASH/HLS fMP4 segment so I can inspect it using https://github.com/virinext/hevcesbrowser for debugging purposes.
For ... | 800 | [
-0.019635384902358055,
0.03979438170790672,
-0.023855067789554596,
-0.009432685561478138,
0.009833092801272869,
-0.009987096302211285,
-0.023470060899853706,
0.04703252390027046,
-0.030800605192780495,
0.016909532248973846,
0.020929010584950447,
-0.03036939725279808,
-0.0012204740196466446,
... | 2,170 |
null | null | null | null | null | null | No_CWE | null | [
"hwchase17",
"langchain"
] | ### Checked other resources
- [x] I added a very descriptive title to this issue.
- [x] I searched the LangChain documentation with the integrated search.
- [x] I used the GitHub search to find a similar question and didn't find it.
- [x] I am sure that this is a bug in LangChain rather than my code.
- [x] The bug is ... | Partially initialised variable ignored when concatenating ChatPromptTemplates. | https://api.github.com/repos/langchain-ai/langchain/issues/30049/comments | 2 | 2025-02-28T17:12:53 | 2025-03-04T07:40:42Z | https://github.com/langchain-ai/langchain/issues/30049 | 2,887,679,733 | 30,049 | false | This is a GitHub Issue
repo:langchain
owner:hwchase17
Title : Partially initialised variable ignored when concatenating ChatPromptTemplates.
Issue date:
--- start body ---
### Checked other resources
- [x] I added a very descriptive title to this issue.
- [x] I searched the LangChain documentation with the integrated... | 4,562 | [
0.0007897006580606103,
-0.01675708405673504,
-0.012819665484130383,
0.04310585930943489,
0.03323039039969444,
-0.01144334301352501,
-0.011379493400454521,
0.015735482797026634,
-0.03510332480072975,
0.014415916055440903,
-0.026675119996070862,
0.033826325088739395,
-0.037089768797159195,
-... | 4,604 |
null | null | null | null | null | null | No_CWE | null | [
"gpac",
"gpac"
] | Steps to reproduce:
1. Download and unpack [sample file](https://www.upload.ee/files/16730075/Passacaglia.zip.html).
2. Execute
`MP4Box.exe -raw audio:output="Passacaglia G.F. Händel J. Halvorsen Relaxing Piano Music Al" "Passacaglia G.F. Händel J. Halvorsen Relaxing Piano Music Al.mp4"`
This will create file `Pa... | -raw creates output file without extension | https://api.github.com/repos/gpac/gpac/issues/2866/comments | 1 | 2024-06-09T22:00:44 | 2024-06-12T13:16:11Z | https://github.com/gpac/gpac/issues/2866 | 2,342,510,598 | 2,866 | false | This is a GitHub Issue
repo:gpac
owner:gpac
Title : -raw creates output file without extension
Issue date:
--- start body ---
Steps to reproduce:
1. Download and unpack [sample file](https://www.upload.ee/files/16730075/Passacaglia.zip.html).
2. Execute
`MP4Box.exe -raw audio:output="Passacaglia G.F. Händel J. Halv... | 668 | [
-0.01384431030601263,
0.024260757490992546,
-0.0172987449914217,
0.026240414008498192,
-0.012183524668216705,
0.01007100474089384,
-0.004869423806667328,
0.04929212108254433,
-0.028113780543208122,
0.0027618866879493,
-0.01453519705682993,
0.0035275090485811234,
0.0012655187165364623,
0.00... | 1,044 |
CVE-2022-45208 | 2022-11-25T17:15:11.173 | Jeecg-boot v3.4.3 was discovered to contain a SQL injection vulnerability via the component /sys/user/putRecycleBin. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "http://jeecg-boot.com"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/jeecgboot/jeecg-boot/issues/4126"
},
{
"s... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jeecg:jeecg_boot:3.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "49DF84AE-6D1A-4065-AB0B-CB6926D6C5F3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | 89 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | [
"jeecgboot",
"jeecg-boot"
] | # sysUserMapper.xml
revertLogicDeleted. You can see that no precompiling is performed
<img width="1048" alt="截屏2022-10-25 11 40 04" src="https://user-images.githubusercontent.com/60163868/197676949-8016d0d1-9874-45fd-ba3f-89c63d8a2c90.png">
# SysUserController.java
<img width="1278" alt="截屏2022-10-25 11 40 32" sr... | [CVE-2022-45208]/sys/user/putRecycleBin is affected by sql injection | https://api.github.com/repos/jeecgboot/JeecgBoot/issues/4126/comments | 2 | 2022-10-25T03:44:24 | 2022-12-07T01:05:07Z | https://github.com/jeecgboot/JeecgBoot/issues/4126 | 1,421,795,524 | 4,126 | true | This is a GitHub Issue
repo:jeecg-boot
owner:jeecgboot
Title : [CVE-2022-45208]/sys/user/putRecycleBin is affected by sql injection
Issue date:
--- start body ---
# sysUserMapper.xml
revertLogicDeleted. You can see that no precompiling is performed
<img width="1048" alt="截屏2022-10-25 11 40 04" src="https://user-imag... | 2,272 | [
-0.01595490053296089,
0.006167076528072357,
-0.010138091631233692,
0.0022137719206511974,
0.024825729429721832,
0.05405932664871216,
-0.01734810136258602,
0.0279427208006382,
0.007339883595705032,
0.03910406678915024,
0.02288941666483879,
-0.01304255984723568,
0.02762787416577339,
-0.00134... | 584 |
null | null | null | null | null | null | No_CWE | null | [
"ImageMagick",
"ImageMagick"
] | ### ImageMagick version
7.1.1-21
### Operating system
Linux
### Operating system, version and so on
Debian bullseye
### Description
I was trying to make a `caption:` best fill a box horizontal and vertical. When the `caption:` starts with a capital letter or `"` the auto-fit works. However, when it starts with a... | Caption: weird behavior depending on first letter capitalization | https://api.github.com/repos/ImageMagick/ImageMagick/issues/7004/comments | 3 | 2024-01-05T17:17:15 | 2024-01-13T15:20:42Z | https://github.com/ImageMagick/ImageMagick/issues/7004 | 2,067,730,948 | 7,004 | false | This is a GitHub Issue
repo:ImageMagick
owner:ImageMagick
Title : Caption: weird behavior depending on first letter capitalization
Issue date:
--- start body ---
### ImageMagick version
7.1.1-21
### Operating system
Linux
### Operating system, version and so on
Debian bullseye
### Description
I was trying to ... | 1,313 | [
0.01661583222448826,
0.032958775758743286,
-0.0016136383637785912,
0.042145997285842896,
0.02363511174917221,
0.019738880917429924,
-0.016949361190199852,
0.046299953013658524,
-0.055305249989032745,
0.0029449136927723885,
0.01667647436261177,
-0.013053130358457565,
-0.008770309388637543,
... | 2,801 |
null | null | null | null | null | null | No_CWE | null | [
"ImageMagick",
"ImageMagick"
] | ### ImageMagick version
7.1.1-30
### Operating system
Linux
### Operating system, version and so on
Ubuntu 22.04.3
### Description
Since the new release 7.1.1-30, my docker container will no longer build.
Here's where it fails.
, the album manager take very long to display (more than 5 seconds) | [album manager] high volume leads to poor performances | https://api.github.com/repos/Piwigo/Piwigo/issues/2209/comments | 0 | 2024-08-23T14:46:12 | 2024-08-23T15:50:06Z | https://github.com/Piwigo/Piwigo/issues/2209 | 2,483,309,547 | 2,209 | false | This is a GitHub Issue
repo:Piwigo
owner:Piwigo
Title : [album manager] high volume leads to poor performances
Issue date:
--- start body ---
When we have lot of albums (e.g 10k albums), the album manager take very long to display (more than 5 seconds)
--- end body ---
| 271 | [
-0.05378599837422371,
0.0012394344666972756,
-0.004336609039455652,
-0.006523735821247101,
-0.0025955659803003073,
-0.03565656393766403,
-0.020342912524938583,
0.05950791388750076,
-0.018957607448101044,
0.024077214300632477,
0.00989288929849863,
-0.003956402651965618,
-0.0016761069418862462... | 3,857 |
null | null | null | null | null | null | No_CWE | null | [
"gpac",
"gpac"
] | - [X] I looked for a similar issue and couldn't find any.
- [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [X] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ..... | Format "wvtt" of WEBVTT subtitle muxed of mp4box won't show subtitle. | https://api.github.com/repos/gpac/gpac/issues/2243/comments | 2 | 2022-08-20T05:59:58 | 2022-08-25T05:15:36Z | https://github.com/gpac/gpac/issues/2243 | 1,345,066,874 | 2,243 | false | This is a GitHub Issue
repo:gpac
owner:gpac
Title : Format "wvtt" of WEBVTT subtitle muxed of mp4box won't show subtitle.
Issue date:
--- start body ---
- [X] I looked for a similar issue and couldn't find any.
- [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightl... | 1,473 | [
-0.008358165621757507,
0.0227560643106699,
-0.01624378375709057,
0.009414011612534523,
0.010506775230169296,
0.019492540508508682,
-0.012389576993882656,
0.050355732440948486,
-0.02951938658952713,
0.018074901774525642,
0.0013511874713003635,
0.030095301568508148,
0.002349811140447855,
0.0... | 1,511 |
null | null | null | null | null | null | No_CWE | null | [
"jerryscript-project",
"jerryscript"
] | After 4 years time to update that README https://github.com/jerryscript-project/jerryscript/blob/master/README.md
=) | Freenode? - IRC what you did | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5161/comments | 2 | 2024-11-09T01:19:44 | 2024-12-18T10:40:46Z | https://github.com/jerryscript-project/jerryscript/issues/5161 | 2,645,448,549 | 5,161 | false | This is a GitHub Issue
repo:jerryscript
owner:jerryscript-project
Title : Freenode? - IRC what you did
Issue date:
--- start body ---
After 4 years time to update that README https://github.com/jerryscript-project/jerryscript/blob/master/README.md
=)
--- end body ---
| 272 | [
-0.011858307756483555,
0.022549428045749664,
-0.01063438132405281,
0.030898064374923706,
0.003983840346336365,
0.01713497005403042,
0.026423843577504158,
0.07457035779953003,
-0.026796694844961166,
0.05777581408619881,
0.0025248550809919834,
0.011234186589717865,
0.015667879953980446,
0.01... | 2,246 |
null | null | null | null | null | null | No_CWE | null | [
"axiomatic-systems",
"Bento4"
] | Hello to everyone.
I'm FreeBSD systemn admin but unfortunately,I'm not a programmer. But anyway,I want to understand if I can accomplish a project with my limited resources. What project is this ? I want to watch the protected contents of NowTV using a bhyve virtual machine running with Linux. To be honest,this is a... | How to watch the contents of NowTV using Linux | https://api.github.com/repos/axiomatic-systems/Bento4/issues/970/comments | 0 | 2024-06-18T22:28:22 | 2024-06-18T22:29:15Z | https://github.com/axiomatic-systems/Bento4/issues/970 | 2,360,849,166 | 970 | false | This is a GitHub Issue
repo:Bento4
owner:axiomatic-systems
Title : How to watch the contents of NowTV using Linux
Issue date:
--- start body ---
Hello to everyone.
I'm FreeBSD systemn admin but unfortunately,I'm not a programmer. But anyway,I want to understand if I can accomplish a project with my limited resource... | 1,690 | [
-0.0170194860547781,
-0.0082246670499444,
-0.017130112275481224,
-0.030720172449946404,
-0.002423149300739169,
0.007714082021266222,
-0.01571749523282051,
0.04411450773477554,
-0.015257969498634338,
0.07393264770507812,
0.0226699560880661,
-0.03395387530326843,
0.005590901244431734,
-0.009... | 1,932 |
null | null | null | null | null | null | No_CWE | null | [
"LibreDWG",
"libredwg"
] | Hi, I was successfully able to get the vertind from dwg_ent_vert_pface_face,
but I don't know the correct way to use this value for retrieving a certain vertex point,
I tried to collect all the vertex points by iterating objects through dwg_get_object() to a vector,
but seems the sequence is not as the same as how... | how to use vertind to retrieve dwg_ent_vertex_pface in current dwg_data? | https://api.github.com/repos/LibreDWG/libredwg/issues/963/comments | 0 | 2024-03-18T01:29:15 | 2024-03-18T01:32:11Z | https://github.com/LibreDWG/libredwg/issues/963 | 2,191,042,711 | 963 | false | This is a GitHub Issue
repo:libredwg
owner:LibreDWG
Title : how to use vertind to retrieve dwg_ent_vertex_pface in current dwg_data?
Issue date:
--- start body ---
Hi, I was successfully able to get the vertind from dwg_ent_vert_pface_face,
but I don't know the correct way to use this value for retrieving a certain v... | 741 | [
-0.009716267697513103,
0.03645801916718483,
-0.012651695869863033,
-0.014449645765125751,
0.028165435418486595,
0.037074461579322815,
0.01327547524124384,
0.035078369081020355,
-0.03763219341635704,
0.027871891856193542,
-0.004315079655498266,
-0.01695209927856922,
-0.007778885308653116,
-... | 2,936 |
null | null | null | null | null | null | No_CWE | null | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [# ] I looked for a similar issue and couldn't find any.
- [# ] I tried with the latest version of GPAC. Installers available at https://gpac.io/downloads/gpac-nightly-builds/
- [# ] I give enough ... | MKV timestamp | https://api.github.com/repos/gpac/gpac/issues/2761/comments | 3 | 2024-02-24T09:03:42 | 2025-01-27T10:32:34Z | https://github.com/gpac/gpac/issues/2761 | 2,152,221,044 | 2,761 | false | This is a GitHub Issue
repo:gpac
owner:gpac
Title : MKV timestamp
Issue date:
--- start body ---
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [# ] I looked for a similar issue and couldn't find any.
- [# ] I tried with the latest version of G... | 982 | [
-0.028446415439248085,
0.026689935475587845,
-0.02193458564579487,
0.014865822158753872,
0.004530434496700764,
-0.00014369581185746938,
-0.014880103059113026,
0.057092756032943726,
-0.04132727161049843,
0.014123245142400265,
0.016936469823122025,
0.020592235028743744,
-0.0008425394189544022,... | 1,126 |
null | null | null | null | null | null | No_CWE | null | [
"gpac",
"gpac"
] | Although gpac handled well heic images, and gives extensive documentation on image extraction, no information is given to reconstruct a multi-pid images in heic into a single image. Example of these images can be found
[here](https://github.com/tigranbs/test-heic-images/tree/master), e.g. [image1.heic](https://github.... | Transcoding or decoding multi-PID heic images | https://api.github.com/repos/gpac/gpac/issues/2845/comments | 1 | 2024-05-24T11:24:18 | 2024-05-27T11:18:41Z | https://github.com/gpac/gpac/issues/2845 | 2,315,157,218 | 2,845 | false | This is a GitHub Issue
repo:gpac
owner:gpac
Title : Transcoding or decoding multi-PID heic images
Issue date:
--- start body ---
Although gpac handled well heic images, and gives extensive documentation on image extraction, no information is given to reconstruct a multi-pid images in heic into a single image. Example ... | 619 | [
-0.04140526428818703,
0.05126776546239853,
-0.021435849368572235,
-0.01659085974097252,
-0.009308995679020882,
0.01916431076824665,
0.019523732364177704,
0.050318896770477295,
-0.019149934872984886,
0.015670740976929665,
0.001528436434455216,
-0.04704098030924797,
0.005908876191824675,
-0.... | 1,057 |
CVE-2023-36201 | 2023-07-07T16:15:09.827 | An issue in JerryscriptProject jerryscript v.3.0.0 allows an attacker to obtain sensitive information via a crafted script to the arrays. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5026"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | 125 | [
"Issue Tracking",
"Third Party Advisory"
] | [
"jerryscript-project",
"jerryscript"
] | # Version
*Version: 3.0.0* ( 6fe763f )
# Execution steps
```bash
/root/.jsvu/jerry Testcase.js
```
# Test case 1
```javascript
var foo = function(it) {
var a = [...it, , ];
print(a);
print(a.length);
};
var Parameter0 = [1, 2];
foo(Parameter0);
```
## Output 1
```
1,2
2
```... | Array concatenation exception | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5026/comments | 1 | 2022-09-27T01:43:11 | 2024-11-21T10:04:37Z | https://github.com/jerryscript-project/jerryscript/issues/5026 | 1,386,949,916 | 5,026 | true | This is a GitHub Issue
repo:jerryscript
owner:jerryscript-project
Title : Array concatenation exception
Issue date:
--- start body ---
# Version
*Version: 3.0.0* ( 6fe763f )
# Execution steps
```bash
/root/.jsvu/jerry Testcase.js
```
# Test case 1
```javascript
var foo = function(it) {
var a = [... | 1,177 | [
-0.011032449081540108,
-0.0032455206383019686,
-0.013887269422411919,
0.038188058882951736,
0.023766959086060524,
-0.00451046135276556,
-0.019604647532105446,
0.042799096554517746,
-0.03614558279514313,
0.012719037011265755,
0.00165854231454432,
0.011550803668797016,
0.019465386867523193,
... | 755 |
CVE-2021-35306 | 2021-08-05T20:15:09.387 | An issue was discovered in Bento4 through v1.6.0-636. A NULL pointer dereference exists in the function AP4_StszAtom::WriteFields located in Ap4StszAtom.cpp. It allows an attacker to cause a denial of service (DOS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/615"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https:... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8A6BE318-62B8-44AE-9090-BF24EC5E846C",
"versionEndExcluding": null,
"versionEndIncluding": "1.6.0-636",
"versionStartExcl... | 476 | [
"Exploit",
"Third Party Advisory"
] | [
"axiomatic-systems",
"Bento4"
] | Hello,
A SEGV has occurred when running program mp42aac,
System info:
Ubuntu 20.04.1 : clang 10.0.0 , gcc 9.3.0
Bento4 version 1.6.0-636
[POC.zip](https://github.com/axiomatic-systems/Bento4/files/6631654/POC.zip)
Verification steps:
1.Get the source code of Bento4
2.Compile
```
cd Bento4
mk... | SEGV in mp42aac | https://api.github.com/repos/axiomatic-systems/Bento4/issues/615/comments | 2 | 2021-06-10T13:16:05 | 2021-12-27T07:29:17Z | https://github.com/axiomatic-systems/Bento4/issues/615 | 917,334,988 | 615 | true | This is a GitHub Issue
repo:Bento4
owner:axiomatic-systems
Title : SEGV in mp42aac
Issue date:
--- start body ---
Hello,
A SEGV has occurred when running program mp42aac,
System info:
Ubuntu 20.04.1 : clang 10.0.0 , gcc 9.3.0
Bento4 version 1.6.0-636
[POC.zip](https://github.com/axiomatic-systems/Bento4... | 3,659 | [
-0.026009317487478256,
0.006528548430651426,
0.00030947866616770625,
-0.003356040921062231,
0.0252602007240057,
-0.011064447462558746,
-0.04680478572845459,
0.042340051382780075,
-0.012817379087209702,
0.03418966755270958,
-0.043568603694438934,
0.0056071351282298565,
0.024556031450629234,
... | 267 |
null | null | null | null | null | null | No_CWE | null | [
"gpac",
"gpac"
] | [poc4](https://user-images.githubusercontent.com/1917976/150096684-a4f38ec1-442d-43f1-a1b8-10d84e718fac.mp4)
```
Description
Null Pointer Dereference in gf_dump_vrml_field.isra ()
Proof of Concept
MP4Box -bt POC
Bt
Program received signal SIGSEGV, Segmentation fault.
0x0000000000644ca4 in gf_dump_vrml... | NULL Pointer Dereference | https://api.github.com/repos/gpac/gpac/issues/2055/comments | 0 | 2022-01-19T08:56:14 | 2022-01-19T11:17:45Z | https://github.com/gpac/gpac/issues/2055 | 1,107,824,879 | 2,055 | false | This is a GitHub Issue
repo:gpac
owner:gpac
Title : NULL Pointer Dereference
Issue date:
--- start body ---
[poc4](https://user-images.githubusercontent.com/1917976/150096684-a4f38ec1-442d-43f1-a1b8-10d84e718fac.mp4)
```
Description
Null Pointer Dereference in gf_dump_vrml_field.isra ()
Proof of Concept
MP4... | 3,349 | [
-0.01497197337448597,
0.023654550313949585,
-0.005311694461852312,
0.023318922147154808,
0.020064780488610268,
0.023391885682940483,
-0.026047732681035995,
0.03916645050048828,
0.008470985107123852,
0.022107739001512527,
-0.03645223379135132,
0.03222038969397545,
0.016737673431634903,
0.00... | 1,672 |
null | null | null | null | null | null | No_CWE | null | [
"LibreDWG",
"libredwg"
] | There is issue in block table parsing in preR13
Example:
[BLOCK1.DXF.gz](https://github.com/LibreDWG/libredwg/files/8549851/BLOCK1.DXF.gz)
[BLOCK1.DWG.gz](https://github.com/LibreDWG/libredwg/files/8549852/BLOCK1.DWG.gz)
Actual parsing:
```
...
blocks 0x46c (0xfffffb94) - 0x0 (0x48, 0x80000000)
...
```
a... | Issue with block table parsing in preR13 | https://api.github.com/repos/LibreDWG/libredwg/issues/444/comments | 7 | 2022-04-24T14:11:24 | 2023-01-16T08:41:34Z | https://github.com/LibreDWG/libredwg/issues/444 | 1,213,665,890 | 444 | false | This is a GitHub Issue
repo:libredwg
owner:LibreDWG
Title : Issue with block table parsing in preR13
Issue date:
--- start body ---
There is issue in block table parsing in preR13
Example:
[BLOCK1.DXF.gz](https://github.com/LibreDWG/libredwg/files/8549851/BLOCK1.DXF.gz)
[BLOCK1.DWG.gz](https://github.com/LibreDWG/... | 762 | [
-0.016080984845757484,
-0.0029570073820650578,
-0.010223140940070152,
0.02936946228146553,
0.02916082739830017,
0.026897935196757317,
0.008249128237366676,
0.053506989032030106,
0.003292027860879898,
0.00932440347969532,
0.018536465242505074,
-0.012421838007867336,
0.021601801738142967,
-0... | 3,200 |
CVE-2024-24150 | 2024-02-29T01:44:11.777 | A memory leak issue discovered in parseSWF_TEXTRECORD in libming v0.4.8 allows attackers to cause a denial of service via a crafted SWF file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"inte... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/libming/libming/issues/309"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | 401 | [
"Exploit",
"Third Party Advisory"
] | [
"libming",
"libming"
] | ### Envrionment
```bash
ubuntu ~/lab/libming/util master lsb_release -a
No LSB modules are available.
Distributor ID: Ubuntu
Description: Ubuntu 22.04.2 LTS
Release: 22.04
Codename: jammy
```
### Compiler
```bash
ubuntu ~/lab/libming/util master clang -v
Ubuntu clang vers... | Memory leaks on parseSWF_TEXTRECORD | https://api.github.com/repos/libming/libming/issues/309/comments | 1 | 2024-01-12T23:44:59 | 2024-02-21T22:47:44Z | https://github.com/libming/libming/issues/309 | 2,079,890,770 | 309 | true | This is a GitHub Issue
repo:libming
owner:libming
Title : Memory leaks on parseSWF_TEXTRECORD
Issue date:
--- start body ---
### Envrionment
```bash
ubuntu ~/lab/libming/util master lsb_release -a
No LSB modules are available.
Distributor ID: Ubuntu
Description: Ubuntu 22.04.2 LTS
Release: 22.... | 3,038 | [
-0.018586711958050728,
0.011104590259492397,
-0.004240587819367647,
0.02100169099867344,
0.056924499571323395,
0.022180430591106415,
-0.02179230935871601,
0.0220223069190979,
-0.03950215503573418,
0.014037064276635647,
0.022697925567626953,
0.0225973017513752,
-0.021533561870455742,
-0.008... | 860 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.