messages listlengths 2 2 |
|---|
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2022-2845\nDescription: Improper Validation of Specified Quantity in Input in GitHub repository vim/vim prior to 9.0.0218.\n\n\n\n```diff\nFrom e98c88c44c308edaea5994b8ad4363e65030968c Mon Sep 17 00:00:00 2001\nFrom... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2013-0313\nDescription: The evm_update_evmxattr function in security/integrity/evm/evm_crypto.c in the Linux kernel before 3.7.5, when the Extended Verification Module (EVM) is enabled, allows local users to cause a... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-4225-xq9f-4ww3\nDescription: \n\n```diff\nFrom 15073504dbb624d3f6c911e85557019d3620fdb2 Mon Sep 17 00:00:00 2001\nFrom: =?UTF-8?q?Daniel=20P=2E=20Berrang=C3=A9?= <berrange@redhat.com>\nDate: Mon, 28 Jun 2021 13:09:... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-p5v3-7243-m33v\nDescription: \n\n```diff\nFrom b84c2cab55948a5ee70860779b2640913e3ee1ed Mon Sep 17 00:00:00 2001\nFrom: Reini Urban <rurban@cpan.org>\nDate: Tue, 31 Dec 2019 08:49:07 +0100\nSubject: [PATCH] encode:... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-pf9q-2ff3-67r4\nDescription: \n\n```diff\nFrom 4f1c6cb2f9afafda05eab150fd2bd284edce6676 Mon Sep 17 00:00:00 2001\nFrom: Thomas Huth <thuth@redhat.com>\nDate: Wed, 25 Sep 2019 14:16:43 +0200\nSubject: [PATCH] hw/cor... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-f58f-h8w5-jgjr\nDescription: \n\n```diff\nFrom 70749bb66cb13dd70bd53340c371038a5f3ca57c Mon Sep 17 00:00:00 2001\nFrom: sunnavy <sunnavy@bestpractical.com>\nDate: Thu, 12 Aug 2021 05:03:16 +0800\nSubject: [PATCH] A... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2023-1067\nDescription: Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.18.\n\n```diff\nFrom 4b5733266d7d6aeb4f221a15e005db83fc198edf Mon Sep 17 00:00:00 2001\nFrom: Christian ... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2022-25878\nDescription: The package protobufjs before 6.11.3 are vulnerable to Prototype Pollution which can allow an attacker to add/modify properties of the Object.prototype. This vulnerability can occur in multi... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-xg73-94fp-g449\nDescription: \n\n```diff\nFrom 7162a50c654792c21f3e4a160eb1a0e6a34f6e6e Mon Sep 17 00:00:00 2001\nFrom: Harutaka Kawamura <hkawamura0130@gmail.com>\nDate: Sat, 25 Feb 2023 11:30:47 +0900\nSubject: [... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-75jx-pcxc-2v2f\nDescription: \n\n```diff\nFrom aa3e54f594385ce7e1e319b0c84999e51192578b Mon Sep 17 00:00:00 2001\nFrom: Denis Ovsienko <denis@ovsienko.info>\nDate: Fri, 1 Sep 2017 17:55:39 +0100\nSubject: [PATCH] (... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-49x3-8228-3w3m\nDescription: \n\n```diff\nFrom ca617df135e78833f93c8320cb2d2cf8bba809f5 Mon Sep 17 00:00:00 2001\nFrom: ready-research <72916209+ready-research@users.noreply.github.com>\nDate: Sat, 11 Sep 2021 18:4... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-r95w-889q-x2gx\nDescription: \n\n```diff\nFrom 4771573dac88e0cf04e30f1a8dfa183c048d503a Mon Sep 17 00:00:00 2001\nFrom: Simon Urli <simon.urli@xwiki.com>\nDate: Tue, 5 Dec 2023 10:01:31 +0100\nSubject: [PATCH] XWIK... |
[
{
"role": "user",
"content": "Review this code for security vulnerabilities:\n\n```python\nfrom flask import Flask, request, redirect\napp = Flask(__name__)\n\n@app.route('/login')\ndef login():\n next_url = request.args.get('next', '/')\n # ... do login ...\n return redirect(next_url)\n```\n\nIden... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-w392-75q8-vr67\nDescription: \n\n```diff\nFrom 14955e6251fd72d12f9b3be729795a00a5e00241 Mon Sep 17 00:00:00 2001\nFrom: zsimjee <zaydsimjee@gmail.com>\nDate: Mon, 16 Sep 2024 17:08:46 -0700\nSubject: [PATCH] safe e... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-mvj8-53vv-j9ff\nDescription: \n\n```diff\nFrom 13ca6f4ab7cd8166e7e3da8171ef758537f0097f Mon Sep 17 00:00:00 2001\nFrom: Robbie Mackay <rm@robbiemackay.com>\nDate: Tue, 3 Jul 2012 14:29:12 +1200\nSubject: [PATCH] Do... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-675q-66gf-gqg8\nDescription: \n\n```diff\nFrom 3e72b2a9a4f50f98cf1f6cf13fa3e405715bb370 Mon Sep 17 00:00:00 2001\nFrom: Simon Larsen <simonlarsen@oneuptime.com>\nDate: Tue, 4 Nov 2025 18:28:10 +0000\nSubject: [PATC... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-w2hv-rcqr-2h7r\nDescription: \n\n```diff\nFrom 42e2c74049ddf5e0aca1fe6aadc7b24fdabb5494 Mon Sep 17 00:00:00 2001\nFrom: Matt Sicker <boards@gmail.com>\nDate: Thu, 25 Mar 2021 07:23:30 +0000\nSubject: [PATCH] [SECUR... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2024-22049\nDescription: httparty before 0.21.0 is vulnerable to an assumed-immutable web parameter vulnerability. A remote and unauthenticated attacker can provide a crafted filename parameter during multipart/form... |
[
{
"role": "user",
"content": "Review this code for security vulnerabilities:\n\n```python\nfrom OpenSSL import SSL\n\ndef getContext():\n '''\n Create an OpenSSL context and return it.\n '''\n ctx = SSL.Context(SSL.TLSv1_2_METHOD)\n return ctx\n```\n\nIdentify any security issues."
},
{
... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-px4h-xg32-q955\nDescription: \n\n```diff\nFrom b1fdb5120b6d27a88400d8800e67ff5a22bd2103 Mon Sep 17 00:00:00 2001\nFrom: Sindre Sorhus <sindresorhus@gmail.com>\nDate: Fri, 21 May 2021 18:41:30 +0700\nSubject: [PATCH... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-vwcr-hcq5-36jr\nDescription: \n\n```diff\nFrom d0fab10ed2a86698937e3c3fed2f10bd9bb5e731 Mon Sep 17 00:00:00 2001\nFrom: Bram Moolenaar <Bram@vim.org>\nDate: Thu, 20 Oct 2022 16:03:33 +0100\nSubject: [PATCH] patch 9... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2023-32677\nDescription: Zulip is an open-source team collaboration tool with unique topic-based threading. Zulip administrators can configure Zulip to limit who can add users to streams, and separately to limit who... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2011-4913\nDescription: The rose_parse_ccitt function in net/rose/rose_subr.c in the Linux kernel before 2.6.39 does not validate the FAC_CCITT_DEST_NSAP and FAC_CCITT_SRC_NSAP fields, which allows remote attackers ... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2020-35848\nDescription: Agentejo Cockpit before 0.11.2 allows NoSQL injection via the Controller/Auth.php newpassword function.\n\n```diff\nFrom 79fc9631ffa29146e3124ceaf99879b92e1ef24b Mon Sep 17 00:00:00 2001\nFr... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-g95c-2jgm-hqc6\nDescription: \n\n```diff\nFrom 5aea738463960d81821c11ae7ade1d627a46bf32 Mon Sep 17 00:00:00 2001\nFrom: Adrian Galvan <adrian@ethyca.com>\nDate: Thu, 6 Jul 2023 09:46:17 -0700\nSubject: [PATCH] Merg... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2022-39322\nDescription: @keystone-6/core is a core package for Keystone 6, a content management system for Node.js. Starting with version 2.2.0 and prior to version 2.3.1, users who expected their `multiselect` fie... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: PYSEC-2022-42975\nDescription: \n\n```diff\nFrom 3cca3a43f3d085e9bbe5a5840c8255bb1b5d052e Mon Sep 17 00:00:00 2001\nFrom: =?UTF-8?q?Gina=20H=C3=A4u=C3=9Fge?= <gina@octoprint.org>\nDate: Wed, 31 Aug 2022 18:28:50 +0200\n... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2016-10969\nDescription: The supportflow plugin before 0.7 for WordPress has XSS via a discussion ticket title.\n\n```diff\nFrom c08d376072f093b650c49dcb44124f43ea0177b1 Mon Sep 17 00:00:00 2001\nFrom: Ian Dunn <ian... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-m658-p24x-p74r\nDescription: \n\n```diff\nFrom 0d92aa486da69b71f2f4a30e62aa722c711b98ac Mon Sep 17 00:00:00 2001\nFrom: Sam Whited <sam@samwhited.com>\nDate: Fri, 11 Feb 2022 12:05:00 -0500\nSubject: [PATCH] websoc... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2024-52293\nDescription: Craft is a content management system (CMS). Prior to 4.12.2 and 5.4.3, Craft is missing normalizePath in the function FileHelper::absolutePath could lead to Remote Code Execution on the serv... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-gh5c-3h97-2f3q\nDescription: \n\n```diff\nFrom 5689dabfb357b673abdb4391eef426f297d7d1bb Mon Sep 17 00:00:00 2001\nFrom: =?UTF-8?q?Pawe=C5=82=20Gronowski?= <pawel.gronowski@docker.com>\nDate: Thu, 22 Feb 2024 18:01:... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-7vjq-m92p-42wp\nDescription: \n\n```diff\nFrom d55bfcd6804699e1435dc3e233fd76c8a5d3f9e3 Mon Sep 17 00:00:00 2001\nFrom: Marta Iborra <martaiborra24@gmail.com>\nDate: Wed, 21 Jun 2023 11:17:51 +0200\nSubject: [PATCH... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2022-2564\nDescription: Prototype Pollution in GitHub repository automattic/mongoose prior to 6.4.6.\n\n```diff\nFrom a45cfb6b0ce0067ae9794cfa80f7917e1fb3c6f8 Mon Sep 17 00:00:00 2001\nFrom: Valeri Karpov <val@karpo... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2025-32960\nDescription: The CUBA REST API add-on performs operations on data and entities. Prior to version 7.2.7, the input parameter, which consists of a file path and name, can be manipulated to return the Conte... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: PYSEC-2022-162\nDescription: \n\n```diff\nFrom 35d59f1f040541c358cece0a8d4a63183ca919b8 Mon Sep 17 00:00:00 2001\nFrom: =?UTF-8?q?Michal=20=C4=8Ciha=C5=99?= <michal@cihar.com>\nDate: Thu, 3 Mar 2022 08:25:01 +0100\nSubj... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2017-7895\nDescription: The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lack certain checks for the end of a buffer, which allows remote attackers to trigger pointer-arithmetic errors ... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2023-46929\nDescription: An issue discovered in GPAC 2.3-DEV-rev605-gfc9e29089-master in MP4Box in gf_avc_change_vui /afltest/gpac/src/media_tools/av_parsers.c:6872:55 allows attackers to crash the application.\n\n`... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2015-8702\nDescription: The DNS::GetResult function in dns.cpp in InspIRCd before 2.0.19 allows remote DNS servers to cause a denial of service (netsplit) via an invalid character in a PTR response, as demonstrated ... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-7p9r-9x76-5h9r\nDescription: \n\n```diff\nFrom ffc095a3e5acc1c404773a0510e6d055a6a72b0e Mon Sep 17 00:00:00 2001\nFrom: \"Dr.Lt.Data\" <dr.lt.data@gmail.com>\nDate: Tue, 24 Sep 2024 01:59:15 +0900\nSubject: [PATCH]... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2016-15029\nDescription: A vulnerability has been found in Ydalb mapicoin up to 1.9.0 and classified as problematic. This vulnerability affects unknown code of the file webroot/stats.php. The manipulation of the arg... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: PYSEC-2021-548\nDescription: \n\n```diff\nFrom 87158f43f05f2720a374f3e6d22a7aaa3a33f750 Mon Sep 17 00:00:00 2001\nFrom: Mihai Maruseac <mihaimaruseac@google.com>\nDate: Fri, 30 Jul 2021 21:11:18 -0700\nSubject: [PATCH] ... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2019-11924\nDescription: A peer could send empty handshake fragments containing only padding which would be kept in memory until a full handshake was received, resulting in memory exhaustion. This issue affects vers... |
[
{
"role": "user",
"content": "Review this code for security vulnerabilities:\n\n```python\nimport requests\ndef webhook_callback(callback_url, data):\n \"\"\"Send data to user's webhook.\"\"\"\n requests.post(callback_url, json=data)\n```\n\nIdentify any security issues, their severity, and how to fix... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-r4r6-j2j3-7pp5\nDescription: \n\n```diff\nFrom 3032baa456f607169ffae82a8920354adb338fe9 Mon Sep 17 00:00:00 2001\nFrom: David Greminger <bytehead@users.noreply.github.com>\nDate: Tue, 9 Apr 2024 07:18:49 +0200\nSub... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2019-13343\nDescription: Butor Portal before 1.0.27 is affected by a Path Traversal vulnerability leading to a pre-authentication arbitrary file download. Effectively, a remote anonymous user can download any file o... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2021-31256\nDescription: Memory leak in the stbl_GetSampleInfos function in MP4Box in GPAC 1.0.1 allows attackers to read memory via a crafted file.\n\n```diff\nFrom 2da2f68bffd51d89b1d272d22aa8cc023c1c066e Mon Sep ... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-q95w-c7qg-hrff\nDescription: \n\n```diff\nFrom 43d84aef04a9e71164c21a74885996981857e66e Mon Sep 17 00:00:00 2001\nFrom: Jacob Walls <jacobtylerwalls@gmail.com>\nDate: Wed, 1 Oct 2025 10:39:02 -0400\nSubject: [PATCH... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-7xr6-r55h-px6v\nDescription: \n\n```diff\nFrom 8e9faa15469ed7c7467423db4c62aeed3ff4cae3 Mon Sep 17 00:00:00 2001\nFrom: Johan Hovold <johan@kernel.org>\nDate: Mon, 30 Jan 2017 11:26:39 +0100\nSubject: [PATCH] HID: ... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-9j4f-f249-q5w8\nDescription: \n\n```diff\nFrom d8dc7f9c1c641881cbcf0a09e178b90ebf0f0228 Mon Sep 17 00:00:00 2001\nFrom: \"Marcelo E. Magallon\" <marcelo.magallon@grafana.com>\nDate: Thu, 24 Nov 2022 17:03:51 -0600\... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2016-10166\nDescription: Integer underflow in the _gdContributionsAlloc function in gd_interpolation.c in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to have unspecified impact via vecto... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2021-29475\nDescription: HedgeDoc (formerly known as CodiMD) is an open-source collaborative markdown editor. An attacker is able to receive arbitrary files from the file system when exporting a note to PDF. Since t... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-h8cp-ph26-xwmv\nDescription: \n\n```diff\nFrom 87c80bfba583eadc087810d17aa631ef4e405efc Mon Sep 17 00:00:00 2001\nFrom: Justin Cormack <justin.cormack@docker.com>\nDate: Mon, 1 Jul 2019 14:37:24 +0100\nSubject: [PA... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2022-2849\nDescription: Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0220.\n\n```diff\nFrom f6d39c31d2177549a986d170e192d8351bd571e2 Mon Sep 17 00:00:00 2001\nFrom: Bram Moolenaar <Bram@vim.o... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-7r96-8g3x-g36m\nDescription: \n\n```diff\nFrom a121b34a45e289d775c62e58841522891dee686b Mon Sep 17 00:00:00 2001\nFrom: CMEONE <contact@kabirwearsato.ga>\nDate: Tue, 15 Jun 2021 10:16:16 -0700\nSubject: [PATCH] Cri... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-w62c-99j3-8frh\nDescription: \n\n```diff\nFrom cf715d911d8ce17969a7926dea651e930c27e71a Mon Sep 17 00:00:00 2001\nFrom: lukasepple <git@lukasepple.de>\nDate: Fri, 15 Aug 2014 13:50:19 +0200\nSubject: [PATCH] fixed ... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-j68h-w25q-72h9\nDescription: \n\n```diff\nFrom 86736f59d6a527d8bc807d09b93f971c0fe0bb07 Mon Sep 17 00:00:00 2001\nFrom: Michael Niedermayer <michaelni@gmx.at>\nDate: Fri, 30 Aug 2013 23:14:32 +0200\nSubject: [PATCH... |
[
{
"role": "user",
"content": "This code was flagged for Zip Bomb / Decompression Bomb (CWE-409):\n\n```python\nimport zipfile\ndef extract_upload(zip_path, dest):\n with zipfile.ZipFile(zip_path) as zf:\n zf.extractall(dest)\n```\n\nThe suggested fix is: Check total uncompressed size before extrac... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-w2mf-888c-4wj5\nDescription: \n\n```diff\nFrom 83f8306117115729ac9346523762c0c396251eb5 Mon Sep 17 00:00:00 2001\nFrom: Ricardo Signes <rjbs@cpan.org>\nDate: Tue, 17 Jun 2014 22:48:03 -0400\nSubject: [PATCH] quoted... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2016-1222\nDescription: Cross-site scripting (XSS) vulnerability in Kobe Beauty php-contact-form before 2016-05-18 allows remote attackers to inject arbitrary web script or HTML via a crafted URI.\n\n```diff\nFrom e... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2024-29859\nDescription: In MISP before 2.4.187, add_misp_export in app/Controller/EventsController.php does not properly check for a valid file upload.\n\n```diff\nFrom 238010bfd004680757b324cba0c6344f77a25399 Mon ... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-xf5p-87ch-gxw2\nDescription: \n\n```diff\nFrom b15e42b67cec9ded8505e9d68bb8741ad7a9590d Mon Sep 17 00:00:00 2001\nFrom: Jamie Davis <davisjam@vt.edu>\nDate: Mon, 26 Feb 2018 11:06:41 -0500\nSubject: [PATCH] securit... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2017-14337\nDescription: When MISP before 2.4.80 is configured with X.509 certificate authentication (CertAuth) in conjunction with a non-MISP external user management ReST API, if an external user provides X.509 ce... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2022-1934\nDescription: Use After Free in GitHub repository mruby/mruby prior to 3.2.\n\n```diff\nFrom aa7f98dedb68d735a1665d3a289036c88b0c47ce Mon Sep 17 00:00:00 2001\nFrom: \"Yukihiro \\\"Matz\\\" Matsumoto\" <ma... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-vr7q-737x-h8wj\nDescription: \n\n```diff\nFrom 232bdaaca98c34a99ffadf27bf6ee08be6cc8f6a Mon Sep 17 00:00:00 2001\nFrom: Bram Moolenaar <Bram@vim.org>\nDate: Fri, 13 Jan 2023 14:17:58 +0000\nSubject: [PATCH] patch 9... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-jrf8-cmgg-gv2m\nDescription: \n\n```diff\nFrom 91b676eecd01f2163e2984215e2c0ac89e30ce75 Mon Sep 17 00:00:00 2001\nFrom: Niklas Fiekas <niklas.fiekas@backscattering.de>\nDate: Sun, 17 Jan 2021 19:05:56 +0100\nSubjec... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-4wjx-42q4-77fh\nDescription: \n\n```diff\nFrom 4a491b1ab11ca0556d2fda1ff1301e862a2d44c4 Mon Sep 17 00:00:00 2001\nFrom: Jason Yan <yanaijie@huawei.com>\nDate: Thu, 4 Jan 2018 21:04:31 +0800\nSubject: [PATCH] scsi: ... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2024-5998\nDescription: A vulnerability in the FAISS.deserialize_from_bytes function of langchain-ai/langchain allows for pickle deserialization of untrusted data. This can lead to the execution of arbitrary command... |
[
{
"role": "user",
"content": "This code was flagged for Timing Attack (CWE-208):\n\n```python\ndef verify_token(token, valid_tokens):\n \"\"\"Check if token is valid.\"\"\"\n for valid in valid_tokens:\n if token == valid:\n return True\n return False\n```\n\nThe suggested fix is:... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2021-3749\nDescription: axios is vulnerable to Inefficient Regular Expression Complexity\n\n```diff\nFrom 5b457116e31db0e88fede6c428e969e87f290929 Mon Sep 17 00:00:00 2001\nFrom: ready-research <72916209+ready-resea... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2024-11407\nDescription: There exists a denial of service through Data corruption in gRPC-C++ - gRPC-C++ servers with transmit zero copy enabled through the channel arg GRPC_ARG_TCP_TX_ZEROCOPY_ENABLED can experienc... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-76f8-p2hg-cf8g\nDescription: \n\n```diff\nFrom f65981b0b8fcf02d69a40bc934803c25c9f607ab Mon Sep 17 00:00:00 2001\nFrom: Dmitry Volyntsev <xeioex@nginx.com>\nDate: Mon, 21 Feb 2022 16:53:16 +0000\nSubject: [PATCH] F... |
[
{
"role": "user",
"content": "Review this code for security vulnerabilities:\n\n```python\nfrom flask import request, Response, Flask\n\napp = Flask(__name__)\n\n\n@app.route('set_location_header')\ndef set_location_header():\n '''\n Get the \"next\" value from the request and set the location header ... |
[
{
"role": "user",
"content": "Review this code for security vulnerabilities:\n\n```python\nimport mysql.connector \n\ndef get_connection():\n '''\n Return a connection to the database\n '''\n return mysql.connector.connect(host = \"localhost\", user = \"\",passwd = \"\") \n\n\ndef show_user( u... |
[
{
"role": "user",
"content": "This code was flagged for Timing Attack (CWE-208):\n\n```python\ndef authenticate(username, password):\n user = database.get_user(username)\n if user is None:\n return False\n return password == user.password_hash\n```\n\nThe suggested fix is: Always perform pas... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-fcm8-q275-jqv2\nDescription: \n\n```diff\nFrom 034c6e9a1d296286305f4cfd1e0072b879f52568 Mon Sep 17 00:00:00 2001\nFrom: Dov Grobgeld <dov.grobgeld@gmail.com>\nDate: Thu, 24 Oct 2019 09:37:29 +0300\nSubject: [PATCH]... |
[
{
"role": "user",
"content": "Review this code for security vulnerabilities:\n\n```python\nimport tarfile\ndef untar(tar_path, dest):\n with tarfile.open(tar_path) as tf:\n tf.extractall(dest)\n```\n\nIdentify any security issues, their severity, and how to fix them."
},
{
"role": "assista... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2021-38160\nDescription: In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size. ... |
[
{
"role": "user",
"content": "Review this code for security vulnerabilities:\n\n```python\nimport os\nfrom flask import Response, request, Flask\n\napp = Flask(__name__)\n\n\n@app.route('/reply')\ndef listFiles():\n '''\n Retrieve the \"username\" from the request's arguments,\n change the current ... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-vc3v-ppc7-v486\nDescription: \n\n```diff\nFrom 92159580f11a17cd2e06f73f636088bbcbfe9cbc Mon Sep 17 00:00:00 2001\nFrom: Bart van Beusekom <b.vanbeusekom@iknl.nl>\nDate: Tue, 14 Nov 2023 09:33:48 +0100\nSubject: [PA... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2022-3234\nDescription: Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0483.\n\n```diff\nFrom c249913edc35c0e666d783bfc21595cf9f7d9e0d Mon Sep 17 00:00:00 2001\nFrom: Bram Moolenaar <Bram@vim.o... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2021-30022\nDescription: There is a integer overflow in media_tools/av_parsers.c in the gf_avc_read_pps_bs_internal in GPAC from 0.5.2 to 1.0.1. pps_id may be a negative number, so it will not return. However, avc->... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2022-31163\nDescription: TZInfo is a Ruby library that provides access to time zone data and allows times to be converted using time zone rules. Versions prior to 0.36.1, as well as those prior to 1.2.10 when used w... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-ghq8-mj24-5v6f\nDescription: \n\n```diff\nFrom 6bd33275368edfa71ae117de895488584678ac79 Mon Sep 17 00:00:00 2001\nFrom: Bron Gondwana <brong@fastmail.fm>\nDate: Thu, 31 Aug 2017 12:43:09 +1000\nSubject: [PATCH] mbo... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-9xqg-wjcv-qqxq\nDescription: \n\n```diff\nFrom d88934406c5375d88f8f1b65331c9f0cab68cc6c Mon Sep 17 00:00:00 2001\nFrom: Bram Moolenaar <Bram@vim.org>\nDate: Fri, 6 May 2022 20:38:47 +0100\nSubject: [PATCH] patch 8.... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-c53x-wwx2-pg96\nDescription: \n\n```diff\nFrom 779c0dcd8aba434a1c94db7d1d2d990a629f9a6c Mon Sep 17 00:00:00 2001\nFrom: Cody Mikol <codymikol@gmail.com>\nDate: Sat, 9 Feb 2019 22:29:54 -0500\nSubject: [PATCH] Use t... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-gj3m-w8pf-46c5\nDescription: \n\n```diff\nFrom e502cc86df9dafded1694fceb3228ee34d11c11a Mon Sep 17 00:00:00 2001\nFrom: Andy Polyakov <appro@openssl.org>\nDate: Fri, 24 Nov 2017 11:35:50 +0100\nSubject: [PATCH] bn/... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-92hx-3mh6-hc49\nDescription: \n\n```diff\nFrom 806f5687962951fefb4942064983bf1ed0cd9435 Mon Sep 17 00:00:00 2001\nFrom: Sergiusz Urbaniak <sergiusz.urbaniak@gmail.com>\nDate: Mon, 8 May 2023 15:37:40 +0200\nSubject... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-gqvf-3hgp-5hxv\nDescription: \n\n```diff\nFrom 5b5af1899dd98d63e1f9b48a93601c2db1f56520 Mon Sep 17 00:00:00 2001\nFrom: pngwn <hello@pngwn.io>\nDate: Mon, 6 Nov 2023 16:36:34 +0000\nSubject: [PATCH] remove echo (#6... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-2xv9-ghh9-xc69\nDescription: \n\n```diff\nFrom 8147abc8cfc3cfe9b9a17cd389076a5d97235a66 Mon Sep 17 00:00:00 2001\nFrom: Alec Larson <1925840+aleclarson@users.noreply.github.com>\nDate: Mon, 19 May 2025 14:32:15 -04... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2022-4397\nDescription: A vulnerability was found in morontt zend-blog-number-2. It has been classified as problematic. Affected is an unknown function of the file application/forms/Comment.php of the component Comm... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2015-7509\nDescription: fs/ext4/namei.c in the Linux kernel before 3.7 allows physically proximate attackers to cause a denial of service (system crash) via a crafted no-journal filesystem, a related issue to CVE-20... |
[
{
"role": "user",
"content": "Review this code for security vulnerabilities:\n\n```python\nfrom flask import Response, request, Flask\nfrom werkzeug.datastructures import Headers\n\napp = Flask(__name__)\n\n\n@app.route('/route')\ndef route():\n '''\n Get the content_type parameter from the request,\n... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-7fxx-c4v5-3v6v\nDescription: \n\n```diff\nFrom cf429e0a2fe26b5f01ce0c8e9b79432e94509b6e Mon Sep 17 00:00:00 2001\nFrom: Thomas Bernard <miniupnp@free.fr>\nDate: Thu, 3 May 2018 17:35:47 +0200\nSubject: [PATCH] fix ... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-vwqw-wfhv-2xcq\nDescription: \n\n```diff\nFrom c08fb7c7a1f5979ff1241a7b28ae0f7690756ad3 Mon Sep 17 00:00:00 2001\nFrom: Agel_Nash <agel-nash@yandex.com>\nDate: Wed, 6 Feb 2019 06:48:49 +0000\nSubject: [PATCH] Fix #... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-r2j8-v967-j6h6\nDescription: \n\n```diff\nFrom 7f5a490d09f4d56801ac3a3e4e39e03e1471b44c Mon Sep 17 00:00:00 2001\nFrom: \"Yukihiro \\\"Matz\\\" Matsumoto\" <matz@ruby.or.jp>\nDate: Sat, 26 Mar 2022 21:06:02 +0900\n... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2022-39189\nDescription: An issue was discovered the x86 KVM subsystem in the Linux kernel before 5.18.17. Unprivileged guest users can compromise the guest kernel because TLB flush operations are mishandled in cert... |
[
{
"role": "user",
"content": "Review this code for security vulnerabilities:\n\n```python\nimport pickle\n\n\nclass Payload(object):\n def __reduce__(self):\n return exec, ('import os;os.system(\"ls\")',)\n\n\ndef makePickleData(payload: Payload):\n '''\n Get serialized data from the payload... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: CVE-2020-36326\nDescription: PHPMailer 6.1.8 through 6.4.0 allows object injection through Phar Deserialization via addAttachment with a UNC pathname. NOTE: this is similar to CVE-2018-19296, but arose because 6.1.8 fix... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-7fc2-rm35-2pp7\nDescription: \n\n```diff\nFrom 1415a9710407e7c14900531813c15ba6165f0816 Mon Sep 17 00:00:00 2001\nFrom: Min RK <benjaminrk@gmail.com>\nDate: Wed, 8 Jul 2015 02:11:16 -0500\nSubject: [PATCH] check or... |
[
{
"role": "user",
"content": "Review this code change for security implications:\n\nCVE: GHSA-35fc-9hrj-3585\nDescription: \n\n```diff\nFrom 7650c47e72f28559e91524f5d68d50c2060df4c7 Mon Sep 17 00:00:00 2001\nFrom: \"Hugh A. Miles II\" <hughmil3s@gmail.com>\nDate: Tue, 20 Aug 2024 20:14:20 -0400\nSubject: [P... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.