messages listlengths 2 2 |
|---|
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-73qw-6rjv-mchr\nDescription: \n\n```diff\nFrom 643f0fcf3b8ab09a68f0ecd2aa37aafeda3e63ef Mon Sep 17 00:00:00 2001\nFrom: Eric Covener <covener@apache.org>\nDate: Wed, 4 Feb 2015 14:44:23 +0000\nSubject: [PATCH] *)... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-mh3m-62v7-68xg\nDescription: \n\n```diff\nFrom 4419d10d576adefa36b0e0a9425d2569f7c0189f Mon Sep 17 00:00:00 2001\nFrom: Isha Arkatkar <ishark@google.com>\nDate: Mon, 18 Jul 2022 10:48:37 -0700\nSubject: [PATCH] Fix... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2024-45390\nDescription: @blakeembrey/template is a string template library. Prior to version 1.2.0, it is possible to inject and run code within the template if the attacker has access to write the template name. V... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2014-9714\nDescription: Cross-site scripting (XSS) vulnerability in the WddxPacket::recursiveAddVar function in HHVM (aka the HipHop Virtual Machine) before 3.5.0 allows remote attackers to inject arbitrary web scri... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2021-32693\nDescription: Symfony is a PHP framework for web and console applications and a set of reusable PHP components. A vulnerability related to firewall authentication is in Symfony starting with version 5.3.0... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2014-125054\nDescription: A vulnerability classified as critical was found in koroket RedditOnRails. This vulnerability affects unknown code of the component Vote Handler. The manipulation leads to improper access c... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2013-2094\nDescription: The perf_swevent_init function in kernel/events/core.c in the Linux kernel before 3.8.9 uses an incorrect integer data type, which allows local users to gain privileges via a crafted perf_eve... |
[
{
"role": "user",
"content": "Review this code for security vulnerabilities:\n\n```python\nimport re\ndef search_users(pattern, users):\n regex = re.compile(pattern)\n return [u for u in users if regex.search(u.name)]\n```\n\nIdentify any security issues, their severity, and how to fix them."
},
{... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2013-4509\nDescription: The default configuration of IBUS 1.5.4, and possibly 1.5.2 and earlier, when IBus.InputPurpose.PASSWORD is not set and used with GNOME 3, does not obscure the entered password characters, wh... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-wggx-8wf7-vg3g\nDescription: \n\n```diff\nFrom 1068447e6954dc6ce52f099ed174c442cb89ed54 Mon Sep 17 00:00:00 2001\nFrom: Lennart Poettering <lennart@poettering.net>\nDate: Wed, 22 Jan 2020 17:05:17 +0100\nSubject: [... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2020-5235\nDescription: There is a potentially exploitable out of memory condition In Nanopb before 0.4.1, 0.3.9.5, and 0.2.9.4. When nanopb is compiled with PB_ENABLE_MALLOC, the message to be decoded contains a re... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2015-5302\nDescription: libreport 2.0.7 before 2.6.3 only saves changes to the first file when editing a crash report, which allows remote attackers to obtain sensitive information via unspecified vectors related to... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-87j6-6jc2-h53q\nDescription: \n\n```diff\nFrom 3ba880a12df5aa4488c18281701b5b1bc3d4531a Mon Sep 17 00:00:00 2001\nFrom: Miaoqian Lin <linmq006@gmail.com>\nDate: Wed, 22 Dec 2021 07:09:30 +0000\nSubject: [PATCH] scs... |
[
{
"role": "user",
"content": "Review this code for security vulnerabilities:\n\n```python\nfrom lxml import etree\nfrom io import StringIO\n\nfrom django.http import HttpResponse\n\n\ndef xpath_query(request):\n '''\n Get the `xpath` value from the GET request,\n get the 'xml' value from the GET re... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2022-31890\nDescription: SQL Injection vulnerability in audit/class.audit.php in osTicket osTicket-plugins before commit a7842d494889fd5533d13deb3c6a7789768795ae via the order parameter to the getOrder function.\n\n... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-pm9p-9926-w68m\nDescription: \n\n```diff\nFrom 71ce93988ead4b561a8592168c72143907189f01 Mon Sep 17 00:00:00 2001\nFrom: Joshua Holbrook <josh.holbrook@gmail.com>\nDate: Tue, 9 Aug 2016 12:37:39 -0400\nSubject: [PAT... |
[
{
"role": "user",
"content": "Review this code for security vulnerabilities:\n\n```python\nfrom functools import wraps\nfrom flask import abort\nfrom flask import g, Flask, request, redirect, session\n\napp = Flask(__name__)\n\ndef ensure_logged_in(f):\n @wraps(f)\n def decorated_function(*args, **kws... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2020-36628\nDescription: A vulnerability classified as critical has been found in Calsign APDE. This affects the function handleExtract of the file APDE/src/main/java/com/calsignlabs/apde/build/dag/CopyBuildTask.jav... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2023-37307\nDescription: In MISP before 2.4.172, title_for_layout is not properly sanitized in Correlations, CorrelationExclusions, and Layouts.\n\n```diff\nFrom 286c84fab0047726a6a396ceefaae1bb666fc485 Mon Sep 17 0... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2022-29186\nDescription: Rundeck is an open source automation service with a web console, command line tools and a WebAPI. Rundeck community and rundeck-enterprise docker images contained a pre-generated SSH keypair... |
[
{
"role": "user",
"content": "Review this code for security vulnerabilities:\n\n```python\ndef evalInput(inputStr):\n '''\n Run the inputStr as a python expression and return the result of the computed expression.\n '''\n output = eval(inputStr)\n return output\n```\n\nIdentify any security i... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-c7pp-g2v2-2766\nDescription: \n\n```diff\nFrom a83436f499f9c01b04280af945a5a81137b6baf1 Mon Sep 17 00:00:00 2001\nFrom: =?UTF-8?q?Jostein=20Kj=C3=B8nigsen?= <jostein@kjonigsen.net>\nDate: Tue, 29 Nov 2016 09:36:02 ... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2025-26794\nDescription: Exim 4.98 before 4.98.1, when SQLite hints and ETRN serialization are used, allows remote SQL injection. (Resolving SQL injection requires an update to 4.99.1 in certain non-default rate-lim... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2022-21227\nDescription: The package sqlite3 before 5.0.3 are vulnerable to Denial of Service (DoS) which will invoke the toString function of the passed parameter. If passed an invalid Function object it will throw... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2022-1071\nDescription: User after free in mrb_vm_exec in GitHub repository mruby/mruby prior to 3.2.\n\n```diff\nFrom aaa28a508903041dd7399d4159a8ace9766b022f Mon Sep 17 00:00:00 2001\nFrom: \"Yukihiro \\\"Matz\\\"... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-6pcv-r3vc-xfcc\nDescription: \n\n```diff\nFrom c2349758acf1874e4c2b93fe41d072336f1a31d0 Mon Sep 17 00:00:00 2001\nFrom: Sasha Levin <sasha.levin@oracle.com>\nDate: Wed, 18 Dec 2013 23:49:42 -0500\nSubject: [PATCH] ... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2024-38529\nDescription: Admidio is a free, open source user management system for websites of organizations and groups. In Admidio before version 4.3.10, there is a Remote Code Execution Vulnerability in the Messag... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-r5jw-62xg-j433\nDescription: \n\n```diff\nFrom 8dd52a1aed3d2fa2835d836de23fc0d8c4ff5db8 Mon Sep 17 00:00:00 2001\nFrom: Daniel Mircea <daniel@viseztrance.com>\nDate: Tue, 21 Apr 2020 22:02:59 +0100\nSubject: [PATCH... |
[
{
"role": "user",
"content": "Review this code for security vulnerabilities:\n\n```python\n'''\nDefine DATABASE variable in the settings for a django application\n'''\n\n\nDATABASES = {\n 'postgresql_db': {\n 'ENGINE': 'django.db.backends.postgresql',\n 'NAME': 'quickdb',\n 'USER': '... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-q8gg-vj6m-hgmj\nDescription: \n\n```diff\nFrom d4bdc89f1743fe3cdb7c3f24b06e4c875f349b0c Mon Sep 17 00:00:00 2001\nFrom: Kerrie Niemasik <kerrie.niemasik@gmail.com>\nDate: Thu, 20 Oct 2022 18:12:27 -0400\nSubject: [... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2019-20922\nDescription: Handlebars before 4.4.5 allows Regular Expression Denial of Service (ReDoS) because of eager matching. The parser may be forced into an endless loop while processing crafted templates. This ... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-jmvv-524f-hj5j\nDescription: \n\n```diff\nFrom e070a31ec81b56377822e44883c64abb41f36a3b Mon Sep 17 00:00:00 2001\nFrom: Mark Thomas <markt@apache.org>\nDate: Tue, 2 May 2017 11:22:59 +0000\nSubject: [PATCH] Use a m... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2023-35847\nDescription: VirtualSquare picoTCP (aka PicoTCP-NG) through 2.1 does not have an MSS lower bound (e.g., it could be zero).\n\n```diff\nFrom eaf166009e44641e6570c576ba071217f100fd99 Mon Sep 17 00:00:00 20... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2018-14881\nDescription: The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-bgp.c:bgp_capabilities_print() (BGP_CAPCODE_RESTART).\n\n```diff\nFrom 86326e880d31b328a151d45348c35220baa9a1ff Mon Sep... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2024-1163\nDescription: The attacker may exploit a path traversal vulnerability leading to information disclosure.\n\n```diff\nFrom 7437d903c0a87802c3751fc529d2de7098094c72 Mon Sep 17 00:00:00 2001\nFrom: Matthew Bl... |
[
{
"role": "user",
"content": "Review this code for security vulnerabilities:\n\n```python\nfrom flask import Flask, request, make_response\napp = Flask(__name__)\n\n@app.route(\"/profile\")\ndef profile():\n '''\n Get the username from the request, make a response with it and return it\n '''\n ... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2022-33127\nDescription: The function that calls the diff tool in Diffy 3.4.1 does not properly handle double quotes in a filename when run in a windows environment. This allows attackers to execute arbitrary comman... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2024-28232\nDescription: Go package IceWhaleTech/CasaOS-UserService provides user management functionalities to CasaOS. The Casa OS Login page has disclosed the username enumeration vulnerability in the login page w... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2019-13275\nDescription: An issue was discovered in the VeronaLabs wp-statistics plugin before 12.6.7 for WordPress. The v1/hit endpoint of the API, when the non-default \"use cache plugin\" setting is enabled, is v... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2025-27151\nDescription: Redis is an open source, in-memory database that persists on disk. In versions starting from 7.0.0 to before 8.0.2, a stack-based buffer overflow exists in redis-check-aof due to the use of ... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2025-66545\nDescription: Nextcloud Groupfolders provides admin-configured folders shared by everyone in a group or team. Prior to 14.0.11, 15.3.12, 16.0.15, 17.0.14, 18.1.8, 19.1.8, and 20.1.2, a user with read-only... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2024-43411\nDescription: CKEditor4 is an open source what-you-see-is-what-you-get HTML editor. A theoretical vulnerability has been identified in CKEditor 4.22 (and above). In a highly unlikely scenario where an att... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-p87v-9j2v-6w24\nDescription: \n\n```diff\nFrom 1e5479084bc9852854feb1ba9bf68b52cd127e02 Mon Sep 17 00:00:00 2001\nFrom: Tor Andersson <tor.andersson@artifex.com>\nDate: Thu, 4 Apr 2019 12:03:02 +0200\nSubject: [PAT... |
[
{
"role": "user",
"content": "Review this code for security vulnerabilities:\n\n```python\nHAS_ADMIN_ACCESS = False\ndef admin_access(request):\n '''\n Read the username and password from the request\n validate the username and password for admin access.\n Flag that the user has admin access.\n ... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: PYSEC-2023-132\nDescription: \n\n```diff\nFrom 007d948cb982daa05bc6619cd20ee55b7e834c38 Mon Sep 17 00:00:00 2001\nFrom: ed <s@ocv.me>\nDate: Sun, 23 Jul 2023 10:55:08 +0000\nSubject: [PATCH] fix GHSA-f54q-j679-p9hh: ref... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-p66q-ppwr-q5j8\nDescription: \n\n```diff\nFrom 4568188ce9097a2e3a3b563311077f2bb82455c0 Mon Sep 17 00:00:00 2001\nFrom: Neil Lathwood <gh+n@laf.io>\nDate: Wed, 30 Oct 2024 02:34:38 +0000\nSubject: [PATCH] Fixed XSS... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2025-3159\nDescription: A vulnerability, which was classified as critical, was found in Open Asset Import Library Assimp 5.4.3. This affects the function Assimp::ASE::Parser::ParseLV4MeshBonesVertices of the file co... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2025-27507\nDescription: The open-source identity infrastructure software Zitadel allows administrators to disable the user self-registration. ZITADEL's Admin API contains Insecure Direct Object Reference (IDOR) vul... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2022-45182\nDescription: Pi-Star_DV_Dash (for Pi-Star DV) before 5aa194d mishandles the module parameter.\n\n```diff\nFrom 1e46533f4051648bc40478d99201f19241bbaa41 Mon Sep 17 00:00:00 2001\nFrom: MW0MWZ <66065904+MW... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2020-8944\nDescription: An arbitrary memory write vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to ecall_restore using the attribute output which fails to check the range of... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-2r4h-8jxv-w2j8\nDescription: \n\n```diff\nFrom 112affffa74b14fc97c54abcf18315df97114917 Mon Sep 17 00:00:00 2001\nFrom: Ian Ward <ian@excess.org>\nDate: Thu, 9 Oct 2025 08:56:09 -0400\nSubject: [PATCH] helpers: str... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-26fg-v32r-h663\nDescription: \n\n```diff\nFrom 100ac7c6467a7de2c05713a0a924984ff1593d53 Mon Sep 17 00:00:00 2001\nFrom: Paul Holden <paulh@moodle.com>\nDate: Thu, 27 Jul 2023 13:01:53 +0100\nSubject: [PATCH] MDL-78... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2023-41049\nDescription: @dcl/single-sign-on-client is an open source npm library which deals with single sign on authentication flows. Improper input validation in the `init` function allows arbitrary javascript to... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2021-32434\nDescription: abcm2ps v8.14.11 was discovered to contain an out-of-bounds read in the function calculate_beam at draw.c.\n\n```diff\nFrom 2f56e1179cab6affeb8afa9d6c324008fe40d8e3 Mon Sep 17 00:00:00 2001\... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-jv7x-xhv2-p5v2\nDescription: \n\n```diff\nFrom c1d0d56889655ce5f2645db5acf0e78d5fc3b36b Mon Sep 17 00:00:00 2001\nFrom: =?UTF-8?q?Saleem=20Hadad=20=D8=B3=D9=84=D9=8A=D9=85=20=D8=AD=D8=AF?=\n =?UTF-8?q?=D8=A7=D8=AF?... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-wpfr-6297-9v57\nDescription: \n\n```diff\nFrom 4d8a3b39fe485a5f83c70617d594be01130c5b83 Mon Sep 17 00:00:00 2001\nFrom: Marcus Weiner <marcus.weiner@gmail.com>\nDate: Wed, 9 Feb 2022 13:49:33 +0100\nSubject: [PATCH... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2024-35366\nDescription: FFmpeg n6.1.1 is Integer Overflow. The vulnerability exists in the parse_options function of sbgdec.c within the libavformat module. When parsing certain options, the software does not adequ... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2018-7480\nDescription: The blkcg_init_queue function in block/blk-cgroup.c in the Linux kernel before 4.11 allows local users to cause a denial of service (double free) or possibly have unspecified other impact by ... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2019-11514\nDescription: User/Command/ConfirmEmailHandler.php in Flarum before 0.1.0-beta.8 mishandles invalidation of user email tokens.\n\n```diff\nFrom 66607a56749339d50620b049701ad4d6a4dafbd7 Mon Sep 17 00:00:00... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-x46g-cxp8-8wjm\nDescription: \n\n```diff\nFrom 876d13c6d20e7e1235b9efbd601b47315debb492 Mon Sep 17 00:00:00 2001\nFrom: Christina Fu <cfu@redhat.com>\nDate: Thu, 29 Jun 2017 15:44:13 -0700\nSubject: [PATCH] Ticket ... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2018-14679\nDescription: An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. There is an off-by-one error in the CHM PMGI/PMGL chunk number validity checks, which could lead to denial of service (... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-g5hj-fh2h-5x5v\nDescription: \n\n```diff\nFrom bf4416ab9129ee3afd56739ea4e3cd0da5484b6b Mon Sep 17 00:00:00 2001\nFrom: Gordon Williams <gw@pur3.co.uk>\nDate: Wed, 23 May 2018 17:27:51 +0100\nSubject: [PATCH] Fix b... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-4ppg-2mx6-fqx9\nDescription: \n\n```diff\nFrom 78ec6751fc57bb17bb67c26870fea396390b9937 Mon Sep 17 00:00:00 2001\nFrom: Marina Glancy <marina@moodle.com>\nDate: Fri, 1 May 2015 22:21:43 +0800\nSubject: [PATCH] MDL-... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-q448-6c3m-cxmj\nDescription: \n\n```diff\nFrom dbba190980fe44ab5377703dc1a9487806ee2a91 Mon Sep 17 00:00:00 2001\nFrom: zhangdaiscott <zhangdaiscott@163.com>\nDate: Wed, 9 Mar 2022 09:45:07 +0800\nSubject: [PATCH] ... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-2vp2-8m5j-4rjx\nDescription: \n\n```diff\nFrom 7178b3380720e910d283036a8d39879a94105515 Mon Sep 17 00:00:00 2001\nFrom: ffdfgdfg <heyingtingaaa@gmail.com>\nDate: Fri, 16 Aug 2019 10:48:48 +0800\nSubject: [PATCH] Ch... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2017-13002\nDescription: The AODV parser in tcpdump before 4.9.2 has a buffer over-read in print-aodv.c:aodv_extension().\n\n```diff\nFrom cbddb98484ea8ec1deece351abd56e063d775b38 Mon Sep 17 00:00:00 2001\nFrom: Guy... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-864j-6qpp-cmrr\nDescription: \n\n```diff\nFrom dcdc3d8675411edce3965941a2ca7c441ca48613 Mon Sep 17 00:00:00 2001\nFrom: Alex Reisner <alex@alexreisner.com>\nDate: Thu, 23 Jan 2020 09:08:45 -0700\nSubject: [PATCH] S... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2015-7364\nDescription: The HTML_Quickform library, as used in Revive Adserver before 3.2.2, allows remote attackers to bypass the CSRF protection mechanism via an empty token.\n\n```diff\nFrom 288f81cc4d69d9ff94759... |
[
{
"role": "user",
"content": "Review this code for security vulnerabilities:\n\n```python\nimport hashlib\n\n\ndef storePassword(userName, Password):\n '''\n Hash the password and update the database with username and hashed password by invoking the updateUserLogin() method\n '''\n hasher = hash... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-7w9j-h3hj-wc9g\nDescription: \n\n```diff\nFrom b64ce17852b180dfeea81cf458660be41a78974d Mon Sep 17 00:00:00 2001\nFrom: \"Yukihiro \\\"Matz\\\" Matsumoto\" <matz@ruby.or.jp>\nDate: Wed, 30 May 2018 17:05:40 +0900\n... |
[
{
"role": "user",
"content": "Review this code for security vulnerabilities:\n\n```python\nimport os\ndef get_file(base_dir, filename):\n path = os.path.join(base_dir, filename)\n with open(path) as f:\n return f.read()\n```\n\nIdentify any security issues, their severity, and how to fix them."... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2017-13023\nDescription: The IPv6 mobility parser in tcpdump before 4.9.2 has a buffer over-read in print-mobility.c:mobility_opt_print().\n\n```diff\nFrom b8e559afaeb8fe0604a1f8e3ad4dc1445de07a00 Mon Sep 17 00:00:0... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2023-0791\nDescription: Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.11.\n\n\n\n```diff\nFrom 26663efcb0b67e421e4ecccad8f19e7106bb03ce Mon Sep 17 00:00:00 2001\nFrom: Thors... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-jxwm-2fgw-85f5\nDescription: \n\n```diff\nFrom 64a82e284dddabaeb549228380103b57dead32a6 Mon Sep 17 00:00:00 2001\nFrom: =?UTF-8?q?Sergi=20=C3=80lvarez=20i=20Capilla?= <pancake@nowsecure.com>\nDate: Fri, 8 Apr 2022 ... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2025-34449\nDescription: Genymobile/scrcpy versions up to and including 3.3.3, prior to commit 3e40b24, contain a buffer overflow vulnerability in the sc_device_msg_deserialize() function. A compromised device can s... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2023-3075\nDescription: Cross-Site Request Forgery (CSRF) in GitHub repository tsolucio/corebos prior to 8.\n\n```diff\nFrom 2e415fb4613bc4122578dad5f40c6f819c228a48 Mon Sep 17 00:00:00 2001\nFrom: joebordes <joe@ts... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2011-1833\nDescription: Race condition in the ecryptfs_mount function in fs/ecryptfs/main.c in the eCryptfs subsystem in the Linux kernel before 3.1 allows local users to bypass intended file permissions via a mount... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-7xwj-5r4v-429p\nDescription: \n\n```diff\nFrom 5b048e87e4e55990dae6b547add4dae59f4e1c76 Mon Sep 17 00:00:00 2001\nFrom: Mihai Maruseac <mihaimaruseac@google.com>\nDate: Fri, 16 Jul 2021 09:14:31 -0700\nSubject: [PA... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2022-24753\nDescription: Stripe CLI is a command-line tool for the Stripe eCommerce platform. A vulnerability in Stripe CLI exists on Windows when certain commands are run in a directory where an attacker has plante... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-93gm-xcwj-q3j2\nDescription: \n\n```diff\nFrom b224c251adfa16a5f84074a3c0886270c9df38de Mon Sep 17 00:00:00 2001\nFrom: whyisjake <whyisjake@git.wordpress.org>\nDate: Mon, 14 Oct 2019 15:43:04 +0000\nSubject: [PATC... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2020-4072\nDescription: In generator-jhipster-kotlin version 1.6.0 log entries are created for invalid password reset attempts. As the email is provided by a user and the api is public this can be used by an attacke... |
[
{
"role": "user",
"content": "Review this code for security vulnerabilities:\n\n```python\nfrom django.conf.urls import url\nimport pickle\n\n\ndef getPickleData(pickled):\n '''\n Return deserialized data\n '''\n return pickle.loads(pickled)\n```\n\nIdentify any security issues."
},
{
"r... |
[
{
"role": "user",
"content": "Review this code for security vulnerabilities:\n\n```python\nfrom django.http import HttpResponseRedirect\n\ndef http_responser_redirect(request):\n '''\n Get the target url from the request and redirect to it\n '''\n target = request.GET.get('target', '/')\n ret... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-hj4w-hm2g-p6w5\nDescription: \n\n```diff\nFrom a5450f11c95847cf51a17207af9a3ca5ab569b2c Mon Sep 17 00:00:00 2001\nFrom: Russell Bryant <rbryant@redhat.com>\nDate: Fri, 25 Apr 2025 12:53:23 -0400\nSubject: [PATCH] [... |
[
{
"role": "user",
"content": "Review this code for security vulnerabilities:\n\n```python\nfrom flask import Flask, request, redirect\n\napp = Flask(__name__)\n\n\n@app.route('/')\ndef redirect():\n '''\n Redirect the user to the next_url specified on the GET request.\n '''\n target = request.a... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2025-27417\nDescription: WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. A Stored Cross-Site Scripting (XSS) vulnerability was identified in the adicionar_status_atend... |
[
{
"role": "user",
"content": "Review this code for security vulnerabilities:\n\n```python\nfrom flask import Flask, request\nimport xml.etree.ElementTree as ET\n\napp = Flask(__name__)\n\n\n@app.post(\"/upload\")\ndef upload():\n '''\n Reads the XML from the incoming request.\n Parse it and return.... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-wv28-7fpw-fj49\nDescription: \n\n```diff\nFrom 7393d87bd354e43120937789956175064e4610a0 Mon Sep 17 00:00:00 2001\nFrom: Jeff Dairiki <dairiki@dairiki.org>\nDate: Tue, 27 Feb 2024 10:40:28 -0800\nSubject: [PATCH] Sa... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2020-36254\nDescription: scp.c in Dropbear before 2020.79 mishandles the filename of . or an empty filename, a related issue to CVE-2018-20685.\n\n```diff\nFrom 8f8a3dff705fad774a10864a2e3dbcfa9779ceff Mon Sep 17 00... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-9r4g-gmfh-6gxg\nDescription: \n\n```diff\nFrom 2d8ccb7b12742bf16b5a6068f9fdeeac69bc11b1 Mon Sep 17 00:00:00 2001\nFrom: p7e4 <44750087+p7e4@users.noreply.github.com>\nDate: Thu, 31 Mar 2022 10:10:37 +0800\nSubject:... |
[
{
"role": "user",
"content": "Review this code for security vulnerabilities:\n\n```python\nfrom lxml import etree\n\n\ndef transform_xml():\n '''\n Create a XML parser, parse the 'resources/config.xsl' file,\n and return an XSLT object.\n '''\n parser = etree.XMLParser(resolve_entities=True)\... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2019-14669\nDescription: Firefly III 4.7.17.3 is vulnerable to stored XSS due to the lack of filtration of user-supplied data in the asset account name. The JavaScript code is executed during a visit to the audit ac... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-rw3x-fqfm-qr37\nDescription: \n\n```diff\nFrom e9c6a182649f4259db704ae15a91ac820e63b0ca Mon Sep 17 00:00:00 2001\nFrom: Mikulas Patocka <mpatocka@redhat.com>\nDate: Wed, 16 Oct 2013 03:17:47 +0100\nSubject: [PATCH]... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2024-27093\nDescription: Minder is a Software Supply Chain Security Platform. In version 0.0.31 and earlier, it is possible for an attacker to register a repository with a invalid or differing upstream ID, which cau... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2021-25972\nDescription: In Camaleon CMS, versions 2.1.2.0 to 2.6.0, are vulnerable to Server-Side Request Forgery (SSRF) in the media upload feature, which allows admin users to fetch media files from external URLs... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-m86r-wr74-693h\nDescription: \n\n```diff\nFrom ebdbb75123c9d5f4643e041314e2bc988a13f20d Mon Sep 17 00:00:00 2001\nFrom: \"cuneyt.ozdas\" <cuneyt.ozdas@autodesk.com>\nDate: Mon, 5 Jan 2026 13:39:29 -0800\nSubject: [... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2021-32607\nDescription: An issue was discovered in Smartstore (aka SmartStoreNET) through 4.1.1. Views/PrivateMessages/View.cshtml does not call HtmlUtils.SanitizeHtml on a private message.\n\n```diff\nFrom 5b4e60a... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2014-1737\nDescription: The raw_cmd_copyin function in drivers/block/floppy.c in the Linux kernel through 3.14.3 does not properly handle error conditions during processing of an FDRAWCMD ioctl call, which allows lo... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-5xq3-7mw9-wj5p\nDescription: \n\n```diff\nFrom 514f4df2ad918e69575028d58b2e33aaf536e59b Mon Sep 17 00:00:00 2001\nFrom: Thorsten Rinne <thorsten@phpmyfaq.de>\nDate: Thu, 6 Apr 2023 16:11:35 +0200\nSubject: [PATCH] ... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-4j93-fm92-rp4m\nDescription: \n\n```diff\nFrom c05850241e2d615721e3492d15fee4e1deec082b Mon Sep 17 00:00:00 2001\nFrom: Julien Robert <julien@rbrt.fr>\nDate: Mon, 19 Feb 2024 22:31:10 +0100\nSubject: [PATCH] fix(x/... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.