cve_id stringclasses 299
values | cve_published stringclasses 299
values | cve_descriptions stringclasses 297
values | cve_metrics dict | cve_references listlengths 1 18 ⌀ | cve_configurations listlengths 1 4 ⌀ | cve_primary_cwe stringclasses 33
values | cve_tags sequencelengths 1 4 ⌀ | issue_owner_repo sequencelengths 2 2 | issue_body stringlengths 0 7.92k ⌀ | issue_title stringlengths 1 335 | issue_comments_url stringlengths 59 81 | issue_comments_count int64 0 146 | issue_created_at timestamp[ns] | issue_updated_at stringlengths 20 20 | issue_html_url stringlengths 40 62 | issue_github_id int64 258M 2.9B | issue_number int64 21 131k | label bool 2
classes | issue_msg stringlengths 115 8.11k | issue_msg_n_tokens int64 115 8.11k | issue_embedding sequencelengths 3.07k 3.07k | __index_level_0__ int64 1 4.74k | cwe_label int64 0 32 | xgb_prediction int64 0 15 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2023-48088 | 2023-11-15T15:15:07.510 | xxl-job-admin 2.4.0 is vulnerable to Cross Site Scripting (XSS) via /xxl-job-admin/joblog/logDetailPage. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/xuxueli/xxl-job/issues/3329"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/xuxueli... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:xuxueli:xxl-job:2.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "122ECDB6-272C-4B31-907E-E9FFB36305EA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | 79 | [
"Exploit",
"Issue Tracking"
] | [
"xuxueli",
"xxl-job"
] | ### Environment
MySQL 5.7.44, XXL-Job-Admin 2.4.0
Virtual Machine 1: Ubuntu 22.04.3 (as XXL-Job-Admin)
Virtual Machine 2: Ubuntu 22.04.3 (as XXL-Job-Executor)
### Vulnerability Information
During the query of /xxl-job-admin/joblog/logDetailPage, the xxl-job-admin will query the related log directly in the machin... | XSS attack appears in /xxl-job-admin/joblog/logDetailPage | https://api.github.com/repos/xuxueli/xxl-job/issues/3329/comments | 1 | 2023-11-08T02:03:54 | 2023-11-23T09:50:55Z | https://github.com/xuxueli/xxl-job/issues/3329 | 1,982,577,272 | 3,329 | true | This is a GitHub Issue
repo:xxl-job
owner:xuxueli
Title : XSS attack appears in /xxl-job-admin/joblog/logDetailPage
Issue date:
--- start body ---
### Environment
MySQL 5.7.44, XXL-Job-Admin 2.4.0
Virtual Machine 1: Ubuntu 22.04.3 (as XXL-Job-Admin)
Virtual Machine 2: Ubuntu 22.04.3 (as XXL-Job-Executor)
### Vul... | 1,394 | [
-0.01616164669394493,
0.003421078436076641,
-0.00034952693386003375,
0.00850845780223608,
0.04588963836431503,
-0.016102662310004234,
0.005238526035100222,
0.03654065728187561,
0.00903194211423397,
-0.004021978937089443,
0.0148934880271554,
-0.005629295948892832,
-0.028356609866023064,
0.0... | 810 | 10 | 0 |
null | null | null | null | null | null | No_CWE | null | [
"libming",
"libming"
] | common ```./swftophp poc-3```
```
==22762==ERROR: AddressSanitizer: SEGV on unknown address 0x000000001000 (pc 0x000000504eaf bp 0x7ffcd7c86d30 sp 0x7ffcd7c86d20 T0)
==22762==The signal is caused by a READ memory access.
#0 0x504eaf in getString /home/eval/Desktop/libming-CVE-2018-8962/obj-aflgo/util/../../ut... | SEGV error in getString | https://api.github.com/repos/libming/libming/issues/279/comments | 0 | 2023-07-21T03:47:04 | 2023-07-21T03:47:04Z | https://github.com/libming/libming/issues/279 | 1,815,107,354 | 279 | false | This is a GitHub Issue
repo:libming
owner:libming
Title : SEGV error in getString
Issue date:
--- start body ---
common ```./swftophp poc-3```
```
==22762==ERROR: AddressSanitizer: SEGV on unknown address 0x000000001000 (pc 0x000000504eaf bp 0x7ffcd7c86d30 sp 0x7ffcd7c86d20 T0)
==22762==The signal is caused by a ... | 1,553 | [
0.008671052753925323,
0.01649393141269684,
0.01241967361420393,
0.023521648719906807,
0.05937209725379944,
0.021007422357797623,
-0.029761778190732002,
0.04737650975584984,
-0.04449877887964249,
0.011329165659844875,
-0.03722872957587242,
0.029701193794608116,
0.01719064451754093,
0.023036... | 3,563 | 0 | 0 |
null | null | null | null | null | null | No_CWE | null | [
"jerryscript-project",
"jerryscript"
] | "I build Jerryscript on MSYS2, it occurs error at this step:\r\n```sh\r\n[235/235] Linking C executa(...TRUNCATED) | link error when build jerry.exe on MSYS2 MinGW64 | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5107/comments | 1 | 2023-11-10T12:53:32 | 2024-12-17T09:41:15Z | https://github.com/jerryscript-project/jerryscript/issues/5107 | 1,987,575,228 | 5,107 | false | "This is a GitHub Issue\nrepo:jerryscript\nowner:jerryscript-project\nTitle : link error when build (...TRUNCATED) | 7,887 | [0.00038295649574138224,0.012811284512281418,-0.01529313251376152,0.014288022182881832,0.01588073559(...TRUNCATED) | 2,278 | 0 | 0 |
null | null | null | null | null | null | No_CWE | null | [
"LibreDWG",
"libredwg"
] | "wrong prev_entity, next_entity links, see 2018/Surface, 2004/113200,\r\nto/2004/from_uloz.to/00_002(...TRUNCATED) | json-check: AcDbBlockTableRecord encode errors | https://api.github.com/repos/LibreDWG/libredwg/issues/830/comments | 1 | 2023-09-01T15:34:55 | 2023-11-24T09:56:47Z | https://github.com/LibreDWG/libredwg/issues/830 | 1,877,637,748 | 830 | false | "This is a GitHub Issue\nrepo:libredwg\nowner:LibreDWG\nTitle : json-check: AcDbBlockTableRecord enc(...TRUNCATED) | 395 | [-0.022862432524561882,0.030358312651515007,-0.009908615611493587,0.02718818001449108,0.029686806723(...TRUNCATED) | 3,015 | 0 | 0 |
null | null | null | null | null | null | No_CWE | null | [
"ImageMagick",
"ImageMagick"
] | "### ImageMagick version\n\n7.1.1-26\n\n### Operating system\n\nLinux\n\n### Operating system, versi(...TRUNCATED) | ImageMagick fails to parse an XBM image in two cases | https://api.github.com/repos/ImageMagick/ImageMagick/issues/7406/comments | 2 | 2024-06-17T20:32:50 | 2024-06-23T22:34:05Z | https://github.com/ImageMagick/ImageMagick/issues/7406 | 2,358,205,744 | 7,406 | false | "This is a GitHub Issue\nrepo:ImageMagick\nowner:ImageMagick\nTitle : ImageMagick fails to parse an (...TRUNCATED) | 1,358 | [0.013359482400119305,0.019775914028286934,-0.011599467135965824,0.017766447737812996,0.032068300992(...TRUNCATED) | 2,679 | 0 | 0 |
null | null | null | null | null | null | No_CWE | null | [
"jeecgboot",
"jeecg-boot"
] | "##### 版本号:\n3.7.1\n\n##### 问题描述:\n\n纵向滚动条滚动后表格线错位\n\n##(...TRUNCATED) | 表格滚动条问题 | https://api.github.com/repos/jeecgboot/JeecgBoot/issues/7793/comments | 2 | 2025-02-10T11:11:34 | 2025-03-03T09:53:58Z | https://github.com/jeecgboot/JeecgBoot/issues/7793 | 2,842,087,233 | 7,793 | false | "This is a GitHub Issue\nrepo:jeecg-boot\nowner:jeecgboot\nTitle : 表格滚动条问题\nIssue date(...TRUNCATED) | 270 | [0.01450492162257433,-0.002526976866647601,-0.0055466582998633385,0.0405510738492012,0.0372962355613(...TRUNCATED) | 3,938 | 0 | 0 |
null | null | null | null | null | null | No_CWE | null | [
"Piwigo",
"Piwigo"
] | "When ratings are disabled (which is the default configuration), Piwigo should not list the filter b(...TRUNCATED) | [search] filter by rating should be hidden when feature is disabled | https://api.github.com/repos/Piwigo/Piwigo/issues/2195/comments | 5 | 2024-07-31T15:20:01 | 2024-09-17T14:51:45Z | https://github.com/Piwigo/Piwigo/issues/2195 | 2,440,319,502 | 2,195 | false | "This is a GitHub Issue\nrepo:Piwigo\nowner:Piwigo\nTitle : [search] filter by rating should be hidd(...TRUNCATED) | 305 | [-0.03818920999765396,0.00037375447573140264,-0.005228904075920582,0.0409727580845356,0.040400438010(...TRUNCATED) | 3,871 | 0 | 0 |
null | null | null | null | null | null | No_CWE | null | [
"free5gc",
"free5gc"
] | "## Describe the bug\r\nTNGF panics on free5gc exit with the message:\r\n```\r\n[FATA][TNGF][NGAP] p(...TRUNCATED) | [Bugs] TNGF dies instead of cleanly exiting on terminate | https://api.github.com/repos/free5gc/free5gc/issues/612/comments | 1 | 2024-10-04T14:29:22 | 2024-10-25T09:49:35Z | https://github.com/free5gc/free5gc/issues/612 | 2,566,526,142 | 612 | false | "This is a GitHub Issue\nrepo:free5gc\nowner:free5gc\nTitle : [Bugs] TNGF dies instead of cleanly ex(...TRUNCATED) | 1,917 | [-0.03860326483845711,-0.0015376487281173468,0.0022092447616159916,-0.017745979130268097,0.033072050(...TRUNCATED) | 4,554 | 0 | 0 |
null | null | null | null | null | null | No_CWE | null | [
"openlink",
"virtuoso-opensource"
] | "The PoC is generated by my DBMS fuzzer. It can also be reproduced in the beta docker image.\r\n```S(...TRUNCATED) | Fuzzer: Virtuoso 7.2.11 crashed at `sqlo_key_part_best` | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1222/comments | 0 | 2024-01-07T09:11:15 | 2024-01-12T12:40:00Z | https://github.com/openlink/virtuoso-opensource/issues/1222 | 2,069,051,421 | 1,222 | false | "This is a GitHub Issue\nrepo:virtuoso-opensource\nowner:openlink\nTitle : Fuzzer: Virtuoso 7.2.11 c(...TRUNCATED) | 2,349 | [-0.025348996743559837,-0.006046993192285299,-0.0074982717633247375,-0.016983678564429283,0.04465471(...TRUNCATED) | 3,737 | 0 | 0 |
null | null | null | null | null | null | No_CWE | null | [
"gpac",
"gpac"
] | "Poc address: https://github.com/Janette88/test_pocs/blob/main/hbo_2429\r\n\r\nMP4Box -dash 1000 /ho(...TRUNCATED) | heap-buffer-overflow in gf_m2ts_get_adaptation_field | https://api.github.com/repos/gpac/gpac/issues/2646/comments | 0 | 2023-10-15T00:36:43 | 2023-12-01T17:15:31Z | https://github.com/gpac/gpac/issues/2646 | 1,943,618,918 | 2,646 | false | "This is a GitHub Issue\nrepo:gpac\nowner:gpac\nTitle : heap-buffer-overflow in gf_m2ts_get_adaptati(...TRUNCATED) | 7,042 | [-0.031421858817338943,-0.0024627442471683025,-0.018168089911341667,0.04419909045100212,0.0245120301(...TRUNCATED) | 1,202 | 0 | 0 |
End of preview. Expand in Data Studio
README.md exists but content is empty.
- Downloads last month
- 2