messages
listlengths
2
2
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: CVE-2016-9288\nDescription: In framework/modules/navigation/controllers/navigationController.php in Exponent CMS v2.4.0 or older, the parameter \"target\" of function \"DragnDropReRank\" is directly used without any fil...
[ { "role": "user", "content": "Review this code for security vulnerabilities:\n\n```python\nfrom django.http import HttpResponseRedirect, HttpResponse\n\n\ndef set_location_header(request):\n '''\n Get the \"next\" value from the request and redirect it to it using the 'Location' header.\n '''\n ...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: CVE-2016-4913\nDescription: The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel before 4.5.5 mishandles NM (aka alternate name) entries containing \\0 characters, which allows local users to obta...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: CVE-2025-11360\nDescription: A vulnerability was detected in jakowenko double-take up to 1.13.1. The impacted element is the function app.use of the file api/src/app.js of the component API. The manipulation of the argu...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: CVE-2022-41901\nDescription: TensorFlow is an open source platform for machine learning. An input `sparse_matrix` that is not a matrix with a shape with rank 0 will trigger a `CHECK` fail in `tf.raw_ops.SparseMatrixNNZ`...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: GHSA-wwfw-m54g-gv72\nDescription: \n\n```diff\nFrom 1a7790f873b1a73d1cfec9548eb08a3b9fd798f3 Mon Sep 17 00:00:00 2001\nFrom: Michael Holman <michhol@microsoft.com>\nDate: Tue, 22 Jan 2019 15:14:37 -0800\nSubject: [PATCH...
[ { "role": "user", "content": "Review this code for security vulnerabilities:\n\n```python\nimport re\n\n\ndef filterScriptTags(content):\n '''\n Remove <script> tags from the content argument.\n '''\n oldContent = \"\"\n while oldContent != content:\n oldContent = content\n cont...
[ { "role": "user", "content": "This code was flagged for TOCTOU Race Condition (CWE-367):\n\n```python\ndef safe_delete(filepath):\n \"\"\"Delete file only if user owns it.\"\"\"\n import os\n if os.path.exists(filepath):\n stat = os.stat(filepath)\n if stat.st_uid == os.getuid():\n ...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: CVE-2025-31487\nDescription: The XWiki JIRA extension provides various integration points between XWiki and JIRA (macros, UI, CKEditor plugin). If the JIRA macro is installed, any logged in XWiki user could edit his/her...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: GHSA-wqwf-x5cj-rg56\nDescription: \n\n```diff\nFrom 27bc865cc1bffb97d4dff38492aa9f830f859e45 Mon Sep 17 00:00:00 2001\nFrom: andyzhangx <xiazhang@microsoft.com>\nDate: Tue, 3 Jul 2018 08:03:31 +0000\nSubject: [PATCH] fi...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: GHSA-jh3w-6jp2-vqqm\nDescription: \n\n```diff\nFrom fd5d8217e83768d7bf841e94b2d4d82642d5bc58 Mon Sep 17 00:00:00 2001\nFrom: Guy Sartorelli <guy.sartorelli@silverstripe.com>\nDate: Tue, 14 Feb 2023 12:52:39 +1300\nSubje...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: CVE-2021-4050\nDescription: livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\n\n```diff\nFrom 0ce1dd2a13509747c240c8484228a5df8d6e03ec Mon Sep 17 00:00...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: CVE-2022-1795\nDescription: Use After Free in GitHub repository gpac/gpac prior to v2.1.0-DEV.\n\n```diff\nFrom c535bad50d5812d27ee5b22b54371bddec411514 Mon Sep 17 00:00:00 2001\nFrom: jeanlf <jeanlf@gpac.io>\nDate: Wed...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: GHSA-frgf-rv99-862x\nDescription: \n\n```diff\nFrom dcef024bae8f63d290454250767a377eb0e1647b Mon Sep 17 00:00:00 2001\nFrom: Richard Jones <richard@users.sourceforge.net>\nDate: Thu, 1 Jul 2010 01:41:54 +0000\nSubject: ...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: CVE-2014-3994\nDescription: Cross-site scripting (XSS) vulnerability in util/templatetags/djblets_js.py in Djblets before 0.7.30 and 0.8.x before 0.8.3 for Django, as used in Review Board, allows remote attackers to inj...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: GHSA-5337-wcgc-wcvp\nDescription: \n\n```diff\nFrom 4a1c5f34bd3e1daed4490e9d97918e504d19733b Mon Sep 17 00:00:00 2001\nFrom: =?UTF-8?q?Zbigniew=20J=C4=99drzejewski-Szmek?= <zbyszek@in.waw.pl>\nDate: Wed, 23 Jun 2021 11:...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: GHSA-hv87-47h9-jcvq\nDescription: \n\n```diff\nFrom d61b49cb90391fc4f7f72a1abe597476c8651a07 Mon Sep 17 00:00:00 2001\nFrom: Konrad Borowski <github@borowski.pw>\nDate: Sat, 15 Sep 2018 12:33:26 +0200\nSubject: [PATCH] ...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: GHSA-4mmh-5vw7-rgvj\nDescription: \n\n```diff\nFrom c942c73136333bc493050910f171a48e6f575b23 Mon Sep 17 00:00:00 2001\nFrom: Jonathan Leitschuh <Jonathan.Leitschuh@gmail.com>\nDate: Fri, 29 Jul 2022 13:38:50 +0000\nSubj...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: CVE-2016-7142\nDescription: The m_sasl module in InspIRCd before 2.0.23, when used with a service that supports SASL_EXTERNAL authentication, allows remote attackers to spoof certificate fingerprints and consequently lo...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: GHSA-q4q2-93pw-qwgf\nDescription: \n\n```diff\nFrom ef647a2acf2363c6018e8543d665ac8862593372 Mon Sep 17 00:00:00 2001\nFrom: Aakash Shah <ashah@pivotal.io>\nDate: Tue, 24 Apr 2018 16:03:36 -0700\nSubject: [PATCH] Revert...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: GHSA-gw6g-3r38-pg33\nDescription: \n\n```diff\nFrom b18012dae552f85dcc5c57d3bf4e997a15b1cc1c Mon Sep 17 00:00:00 2001\nFrom: erouault <erouault>\nDate: Sun, 27 Dec 2015 16:55:20 +0000\nSubject: [PATCH] * libtiff/tif_nex...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: GHSA-7m48-2x85-6wq3\nDescription: \n\n```diff\nFrom 275a54268b2e30923e6dfd56b223ef7cce9230dd Mon Sep 17 00:00:00 2001\nFrom: Daniel Neto <me@danielneto.com>\nDate: Mon, 15 Dec 2025 10:50:36 -0300\nSubject: [PATCH] Add a...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: CVE-2019-17426\nDescription: Automattic Mongoose through 5.7.4 allows attackers to bypass access control (in some applications) because any query object with a _bsontype attribute is ignored. For example, adding \"_bson...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: GHSA-fr6p-j5w9-5pc8\nDescription: \n\n```diff\nFrom bc6cba3f552c44565f7f1e66dc1580189addb2b4 Mon Sep 17 00:00:00 2001\nFrom: David Bryant <david@wavpack.com>\nDate: Tue, 5 Mar 2019 21:32:27 -0800\nSubject: [PATCH] issue...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: CVE-2025-23212\nDescription: Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. The external storage feature allows any user to enumerate the name and content of files o...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: GHSA-xm64-phgg-mwc9\nDescription: \n\n```diff\nFrom b238cade9a173c6f751a34acf8ccff838a62aa47 Mon Sep 17 00:00:00 2001\nFrom: Thomas Bernard <miniupnp@free.fr>\nDate: Tue, 1 Mar 2016 19:14:15 +0100\nSubject: [PATCH] mini...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: GHSA-gjhx-wc4x-rwwp\nDescription: \n\n```diff\nFrom 6c8f8456cb0b239812dee5211881426496da7b98 Mon Sep 17 00:00:00 2001\nFrom: Klaus Jensen <k.jensen@samsung.com>\nDate: Tue, 8 Aug 2023 17:16:13 +0200\nSubject: [PATCH] hw...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: CVE-2024-25678\nDescription: In LiteSpeed QUIC (LSQUIC) Library before 4.0.4, DCID validation is mishandled.\n\n```diff\nFrom 515f453556c99d27c4dddb5424898dc1a5537708 Mon Sep 17 00:00:00 2001\nFrom: George Wang <gwang@l...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: GHSA-c3hj-j6pp-p2f3\nDescription: \n\n```diff\nFrom 2d35fcc7e9e976a2346b1de20e54f8663e8a6cba Mon Sep 17 00:00:00 2001\nFrom: James Carter <jwcart2@gmail.com>\nDate: Thu, 8 Apr 2021 13:32:04 -0400\nSubject: [PATCH] libse...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: CVE-2018-19045\nDescription: keepalived 2.0.8 used mode 0666 when creating new temporary files upon a call to PrintData or PrintStats, potentially leaking sensitive information.\n\n```diff\nFrom 5241e4d7b177d0b6f073cfc9...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: GHSA-q485-j897-qc27\nDescription: \n\n```diff\nFrom 2eb0ea97f745740b18dd45e4a909112d4685f87b Mon Sep 17 00:00:00 2001\nFrom: zhutougg <zhutougg@secbug.org>\nDate: Thu, 20 Dec 2018 21:11:13 +0800\nSubject: [PATCH] Repair...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: CVE-2013-5705\nDescription: apache2/modsecurity.c in ModSecurity before 2.7.6 allows remote attackers to bypass rules by using chunked transfer coding with a capitalized Chunked value in the Transfer-Encoding HTTP heade...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: CVE-2022-33068\nDescription: An integer overflow in the component hb-ot-shape-fallback.cc of Harfbuzz v4.3.0 allows attackers to cause a Denial of Service (DoS) via unspecified vectors.\n\n```diff\nFrom 62e803b36173fd09...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: CVE-2019-16930\nDescription: Zcashd in Zcash before 2.0.7-3 allows discovery of the IP address of a full node that owns a shielded address, related to mishandling of exceptions during deserialization of note plaintexts....
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: CVE-2020-8639\nDescription: An unrestricted file upload vulnerability in keywordsImport.php in TestLink 1.9.20 allows remote attackers to execute arbitrary code by uploading a file with an executable extension. This all...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: CVE-2023-28430\nDescription: OneSignal is an email, sms, push notification, and in-app message service for mobile apps.The Zapier.yml workflow is triggered on issues (types: [closed]) (i.e., when an Issue is closed). Th...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: CVE-2012-1208\nDescription: Multiple cross-site scripting (XSS) vulnerabilities in backend/core/engine/base.php in Fork CMS 3.2.4 and possibly other versions before 3.2.5 allow remote attackers to inject arbitrary web s...
[ { "role": "user", "content": "This code was flagged for TOCTOU Race Condition (CWE-367):\n\n```python\ndef safe_create_file(path, content):\n import os\n if not os.path.exists(path):\n with open(path, 'w') as f:\n f.write(content)\n```\n\nThe suggested fix is: Use os.open() with O_CR...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: GHSA-6898-wx94-8jq8\nDescription: \n\n```diff\nFrom 8e2e7306088624503ba5eec592b502c4f97d8846 Mon Sep 17 00:00:00 2001\nFrom: Neal Poole <neal@cs.brown.edu>\nDate: Tue, 14 May 2013 15:39:05 -0400\nSubject: [PATCH] Replac...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: CVE-2021-21250\nDescription: OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, there is a critical vulnerability which may lead to arbitrary file read. When BuildSpec is provided in XML format, th...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: CVE-2020-36278\nDescription: Leptonica before 1.80.0 allows a heap-based buffer over-read in findNextBorderPixel in ccbord.c.\n\n```diff\nFrom 8d6e1755518cfb98536d6c3daf0601f226d16842 Mon Sep 17 00:00:00 2001\nFrom: Dan...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: GHSA-76p3-8jx3-jpfq\nDescription: \n\n```diff\nFrom 4504e34c4796a5836ef70458327351675aed48a5 Mon Sep 17 00:00:00 2001\nFrom: Alexander Akait <4567934+alexander-akait@users.noreply.github.com>\nDate: Mon, 7 Nov 2022 23:3...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: CVE-2024-52595\nDescription: lxml_html_clean is a project for HTML cleaning functionalities copied from `lxml.html.clean`. Prior to version 0.4.0, the HTML Parser in lxml does not properly handle context-switching for s...
[ { "role": "user", "content": "Review this code for security vulnerabilities:\n\n```python\nimport jwt\n\n\ndef verifyJWTToken(key, token):\n '''\n Decode the JWT token with the given key and return it.\n '''\n return jwt.decode(token, key, options={\"verify_signature\": False})\n```\n\nIden...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: CVE-2022-4455\nDescription: A vulnerability was identified in sproctor php-calendar up to 2.0.13. This impacts an unknown function of the file index.php. Such manipulation of the argument $_SERVER['PHP_SELF'] leads to c...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: CVE-2025-43973\nDescription: An issue was discovered in GoBGP before 3.35.0. pkg/packet/rtr/rtr.go does not verify that the input length corresponds to a situation in which all bytes are available for an RTR message.\n\...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: CVE-2022-1106\nDescription: use after free in mrb_vm_exec in GitHub repository mruby/mruby prior to 3.2.\n\n```diff\nFrom 7f5a490d09f4d56801ac3a3e4e39e03e1471b44c Mon Sep 17 00:00:00 2001\nFrom: \"Yukihiro \\\"Matz\\\" ...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: GHSA-xcvw-hh99-qm73\nDescription: \n\n```diff\nFrom 3acad2d8683688ce022abf2dfbab9fb500c5a619 Mon Sep 17 00:00:00 2001\nFrom: Nathaly Gomes <nathaly.gomes@liferay.com>\nDate: Fri, 26 Jan 2024 08:44:55 -0300\nSubject: [PA...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: GHSA-w4fh-p39j-749c\nDescription: \n\n```diff\nFrom 45e0d3302d92df7d7f2d609c31cea71165600b79 Mon Sep 17 00:00:00 2001\nFrom: gandharv <gandharvkumargarg@gmail.com>\nDate: Tue, 23 Aug 2022 11:59:57 +0530\nSubject: [PATCH...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: GHSA-hjq3-qcx4-mc3m\nDescription: \n\n```diff\nFrom 454a11a1c9c686c78aa97954306fb63453299760 Mon Sep 17 00:00:00 2001\nFrom: Michael Niedermayer <michaelni@gmx.at>\nDate: Fri, 30 Aug 2013 23:40:47 +0200\nSubject: [PATCH...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: GHSA-ggwg-cmwp-46r5\nDescription: \n\n```diff\nFrom 40fe496eda529fd1d933b56a1022ec32d3cd0b12 Mon Sep 17 00:00:00 2001\nFrom: ErickSkrauch <erickskrauch@yandex.ru>\nDate: Wed, 24 Jul 2024 23:54:09 +0200\nSubject: [PATCH]...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: GHSA-qq3j-4f4f-9583\nDescription: \n\n```diff\nFrom 8cb522b4190bd556ce51be04942720650b1a3e57 Mon Sep 17 00:00:00 2001\nFrom: Matt <Rocketknight1@users.noreply.github.com>\nDate: Fri, 14 Mar 2025 12:18:49 +0000\nSubject:...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: GHSA-pwq6-w399-r46m\nDescription: \n\n```diff\nFrom a4f6a8f8d604271f81984cfcbba0471af58e34dc Mon Sep 17 00:00:00 2001\nFrom: Ad Schellevis <ad@opnsense.org>\nDate: Thu, 29 Jun 2023 22:06:31 +0200\nSubject: [PATCH] Syste...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: PYSEC-2021-621\nDescription: \n\n```diff\nFrom fa6b7782fbb14aa08d767bc799c531f5e1fb3bb8 Mon Sep 17 00:00:00 2001\nFrom: Edward Loper <edloper@google.com>\nDate: Thu, 30 Sep 2021 15:52:09 -0700\nSubject: [PATCH] Fix null...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: CVE-2012-1123\nDescription: The mci_check_login function in api/soap/mc_api.php in the SOAP API in MantisBT before 1.2.9 allows remote attackers to bypass authentication via a null password.\n\n```diff\nFrom f5106be52cf...
[ { "role": "user", "content": "Review this code for security vulnerabilities:\n\n```python\nfrom flask import Flask, request, Response\n\napp = Flask(__name__)\n\n@app.route('/')\ndef route():\n '''\n Get the content_type parameter from the request,\n create a response with the content_type and send...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: GHSA-v82v-rq72-phq9\nDescription: \n\n```diff\nFrom 1b1c91e71d946544d97ccc7cf0ac62b859e03311 Mon Sep 17 00:00:00 2001\nFrom: William Hilton <wmhilton@gmail.com>\nDate: Thu, 6 Jan 2022 21:30:39 -0500\nSubject: [PATCH] fi...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: GHSA-54m3-95j9-v89j\nDescription: \n\n```diff\nFrom 590258255bcb3a5fa4c56f21297b6c99131cfb9d Mon Sep 17 00:00:00 2001\nFrom: Seiji Chew <67301797+schew2381@users.noreply.github.com>\nDate: Tue, 10 Sep 2024 14:12:14 -070...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: GHSA-xm92-v2mq-842q\nDescription: \n\n```diff\nFrom 237432512df0e27013f7c7b9ab59fdce44ca34a5 Mon Sep 17 00:00:00 2001\nFrom: Lukasz Lenart <lukaszlenart@apache.org>\nDate: Thu, 12 May 2016 15:36:12 +0200\nSubject: [PATC...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: GHSA-6fvx-r7hx-3vh6\nDescription: \n\n```diff\nFrom ef111822562d0b9365bd3e671a75b65bd0613353 Mon Sep 17 00:00:00 2001\nFrom: evernat <evernat@free.fr>\nDate: Tue, 4 Sep 2018 08:31:29 +0200\nSubject: [PATCH] fix for secu...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: CVE-2019-1010308\nDescription: Aquaverde GmbH Aquarius CMS prior to version 4.1.1 is affected by: Incorrect Access Control. The impact is: The access to the log file is not restricted. It contains sensitive information ...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: CVE-2018-25070\nDescription: A vulnerability has been found in polterguy Phosphorus Five up to 8.2 and classified as critical. This vulnerability affects the function csv.Read of the file plugins/extras/p5.mysql/NonQuer...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: GHSA-mr6h-7x2m-rgmq\nDescription: \n\n```diff\nFrom 908aef65967ce6184bdc587fd105660d5d55129e Mon Sep 17 00:00:00 2001\nFrom: Tony Murray <murraytony@gmail.com>\nDate: Thu, 5 Oct 2023 23:04:04 -0500\nSubject: [PATCH] Fix...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: GHSA-762h-vpvw-3rcx\nDescription: \n\n```diff\nFrom d66e1d568275e6a2947de97dca7a102a211e01ce Mon Sep 17 00:00:00 2001\nFrom: Antonio Sanchez <cantonios@google.com>\nDate: Thu, 29 Sep 2022 09:19:02 -0700\nSubject: [PATCH...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: GHSA-wj2v-cw66-5qcg\nDescription: \n\n```diff\nFrom 2cb291191c93c7c4e371e22cb89805a5b31d6608 Mon Sep 17 00:00:00 2001\nFrom: Scott Godin <sgodin@sipspectrum.com>\nDate: Thu, 21 Jun 2018 10:24:38 -0400\nSubject: [PATCH] ...
[ { "role": "user", "content": "Review this code for security vulnerabilities:\n\n```python\nfrom flask import Flask, request\napp = Flask(__name__)\n\n@app.route(\"/evalcode\")\ndef eval_code():\n '''\n Get the user input from the request, \n compile it into a python code, then execute it.\n '''\...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: CVE-2024-26142\nDescription: Rails is a web-application framework. Starting in version 7.1.0, there is a possible ReDoS vulnerability in the Accept header parsing routines of Action Dispatch. This vulnerability is patch...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: GHSA-cxm3-wv7p-598c\nDescription: \n\n```diff\nFrom 3905475cfd0e0ea670e20c6a9eaeb768169dc33d Mon Sep 17 00:00:00 2001\nFrom: StrikeOmega0788 <228370891+StrikeOmega0788@users.noreply.github.com>\nDate: Sun, 24 Aug 2025 2...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: CVE-2024-47178\nDescription: basic-auth-connect is Connect's Basic Auth middleware in its own module. basic-auth-connect < 1.1.0 uses a timing-unsafe equality comparison that can leak timing information. This issue has ...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: CVE-2025-64187\nDescription: OctoPrint provides a web interface for controlling consumer 3D printers. Versions 1.11.3 and below are affected by a vulnerability that allows injection of arbitrary HTML and JavaScript into...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: GHSA-qrm8-cw73-r9w8\nDescription: \n\n```diff\nFrom 6ddcb029638b5af05df701a11139d6a6c015ab7e Mon Sep 17 00:00:00 2001\nFrom: Modest Machnicki <mmachnicki@trek10.com>\nDate: Tue, 14 Apr 2020 16:23:00 +0200\nSubject: [PAT...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: CVE-2023-34104\nDescription: fast-xml-parser is an open source, pure javascript xml parser. fast-xml-parser allows special characters in entity names, which are not escaped or sanitized. Since the entity name is used fo...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: GHSA-h4rm-mm56-xf63\nDescription: \n\n```diff\nFrom 9f309ab834797f280cb5143a2f6f987579fa7cdf Mon Sep 17 00:00:00 2001\nFrom: Thomas Chauchefoin <thomas.chauchefoin@trailofbits.com>\nDate: Fri, 9 Jan 2026 10:50:55 +0100\...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: GHSA-cjcc-p67m-7qxm\nDescription: \n\n```diff\nFrom 628d406bfafb80fc32147837888c0057d89a021e Mon Sep 17 00:00:00 2001\nFrom: \"Stefano D. Mtangoo\" <mwinjilisti@gmail.com>\nDate: Thu, 30 May 2024 19:15:58 +0300\nSubject...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: CVE-2026-21440\nDescription: AdonisJS is a TypeScript-first web framework. A Path Traversal vulnerability in AdonisJS multipart file handling may allow a remote attacker to write arbitrary files to arbitrary locations o...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: GHSA-275c-w5mq-v5m2\nDescription: \n\n```diff\nFrom 6ef71779197ad6faf51ac295022ab5008d81372f Mon Sep 17 00:00:00 2001\nFrom: wanghuancoder <wanghuan29@baidu.com>\nDate: Thu, 14 Dec 2023 09:26:12 +0800\nSubject: [PATCH] ...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: CVE-2014-3534\nDescription: arch/s390/kernel/ptrace.c in the Linux kernel before 3.15.8 on the s390 platform does not properly restrict address-space control operations in PTRACE_POKEUSR_AREA requests, which allows loca...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: GHSA-v9cx-qp5g-qchc\nDescription: \n\n```diff\nFrom fe518d81b338941e0bf1c5ce5e75a9ab6de4bb58 Mon Sep 17 00:00:00 2001\nFrom: Fabian Vogt <fabian@ritter-vogt.de>\nDate: Thu, 7 Nov 2024 14:47:26 +0100\nSubject: [PATCH] Tr...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: GHSA-wp3c-xw9g-gpcg\nDescription: \n\n```diff\nFrom 7ae2af34087fb4b5c8915279efd03da3b81028bc Mon Sep 17 00:00:00 2001\nFrom: Amit Patankar <amitpatankar@google.com>\nDate: Tue, 4 May 2021 21:30:50 -0700\nSubject: [PATCH...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: GHSA-2w7f-f8wc-vhx7\nDescription: \n\n```diff\nFrom a7f22a133c188d21d5532fd0eee23d1771a0e586 Mon Sep 17 00:00:00 2001\nFrom: Saifeddine ALOUI <aloui.seifeddine@gmail.com>\nDate: Thu, 7 Mar 2024 13:19:58 +0100\nSubject: ...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: CVE-2020-24240\nDescription: GNU Bison before 3.7.1 has a use-after-free in _obstack_free in lib/obstack.c (called from gram_lex) when a '\\0' byte is encountered. NOTE: there is a risk only if Bison is used with untrus...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: GHSA-5f77-76r3-qf34\nDescription: \n\n```diff\nFrom 00cc7e28a3ed54b3b512ef3b58ea737a57acf1f9 Mon Sep 17 00:00:00 2001\nFrom: \"K.Takata\" <kentkt@csc.jp>\nDate: Mon, 29 Jul 2019 20:15:26 +0900\nSubject: [PATCH] Fix SEGV...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: PYSEC-2017-46\nDescription: \n\n```diff\nFrom c2078a53543ed502efd968649fee1125e0eb549c Mon Sep 17 00:00:00 2001\nFrom: Kyle Kelley <rgbkrk@gmail.com>\nDate: Sun, 21 Jun 2015 23:12:34 -0500\nSubject: [PATCH] Set content ...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: GHSA-77m6-x95j-75r5\nDescription: \n\n```diff\nFrom a986a9335d591fa5c826157d1674d47aa525357f Mon Sep 17 00:00:00 2001\nFrom: JOE1994 <joseph942010@gmail.com>\nDate: Sat, 23 Jan 2021 23:07:17 -0500\nSubject: [PATCH] 'T: ...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: CVE-2025-30166\nDescription: Pimcore's Admin Classic Bundle provides a Backend UI for Pimcore. An HTML injection issue allows users with access to the email sending functionality to inject arbitrary HTML code into email...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: GHSA-pqjc-5x4q-33rx\nDescription: \n\n```diff\nFrom e6a623460e5fc960ac3ee9f946d3106233fd28d8 Mon Sep 17 00:00:00 2001\nFrom: =?UTF-8?q?Salva=20Peir=C3=B3?= <speiro@ai2.upv.es>\nDate: Wed, 30 Apr 2014 19:48:02 +0200\nSub...
[ { "role": "user", "content": "Review this code for security vulnerabilities:\n\n```python\nfrom urllib.parse import urljoin\nimport requests\ndef fetch_resource(base, path):\n url = urljoin(base, path)\n return requests.get(url).content\n```\n\nIdentify any security issues, their severity, and how to ...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: PYSEC-2021-155\nDescription: \n\n```diff\nFrom ff70c47a396ef1e3cb73c90513da4f5cb71bebba Mon Sep 17 00:00:00 2001\nFrom: Amit Patankar <amitpatankar@google.com>\nDate: Tue, 13 Apr 2021 14:24:00 -0700\nSubject: [PATCH] Fi...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: CVE-2021-46461\nDescription: njs through 0.7.0, used in NGINX, was discovered to contain an out-of-bounds array access via njs_vmcode_typeof in /src/njs_vmcode.c.\n\n```diff\nFrom d457c9545e7e71ebb5c0479eb16b9d33175855e...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: GHSA-7gcf-2wg8-c4pq\nDescription: \n\n```diff\nFrom 5241e4d7b177d0b6f073cfc9ed5444bf51ec89d6 Mon Sep 17 00:00:00 2001\nFrom: Quentin Armitage <quentin@armitage.org.uk>\nDate: Wed, 31 Oct 2018 21:57:02 +0000\nSubject: [P...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: CVE-2019-3561\nDescription: Insufficient boundary checks for the strrpos and strripos functions allow access to out-of-bounds memory. This affects all supported versions of HHVM (4.0.3, 3.30.4, and 3.27.7 and below).\n\...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: GHSA-6623-c6mr-6737\nDescription: \n\n```diff\nFrom f025a697c1d1d0264064d5adf6cb0b20d85041b6 Mon Sep 17 00:00:00 2001\nFrom: Jongyoul Lee <jongyoul@gmail.com>\nDate: Tue, 18 Jul 2023 15:13:08 +0900\nSubject: [PATCH] [HO...
[ { "role": "user", "content": "This code was flagged for TOCTOU Race Condition (CWE-367):\n\n```python\ndef update_config(config_path):\n import os, json\n if os.access(config_path, os.W_OK):\n with open(config_path, 'r') as f:\n config = json.load(f)\n config['updated'] = True...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: GHSA-qc5c-m97j-wqw3\nDescription: \n\n```diff\nFrom 8717f469b10e9f7e1547c6f70f7d24e1359d28d4 Mon Sep 17 00:00:00 2001\nFrom: James Cole <thegrumpydictator@gmail.com>\nDate: Sat, 3 Aug 2019 05:08:20 +0200\nSubject: [PATC...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: CVE-2022-21676\nDescription: Engine.IO is the implementation of transport-based cross-browser/cross-device bi-directional communication layer for Socket.IO. A specially crafted HTTP request can trigger an uncaught excep...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: GHSA-543c-wff7-pg59\nDescription: \n\n```diff\nFrom a7968115581e20ef47a533e030f59f830486bdfa Mon Sep 17 00:00:00 2001\nFrom: webzwo0i <webzwo0i@c3d2.de>\nDate: Tue, 6 Apr 2021 12:52:04 +0200\nSubject: [PATCH] escape use...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: GHSA-348r-6928-rfcr\nDescription: \n\n```diff\nFrom 3e22d11c7175c1ebbf3d862545ce6fee18f70617 Mon Sep 17 00:00:00 2001\nFrom: Brady Miller <brady.g.miller@gmail.com>\nDate: Tue, 7 Aug 2018 21:59:00 -0700\nSubject: [PATCH...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: CVE-2023-4750\nDescription: Use After Free in GitHub repository vim/vim prior to 9.0.1857.\n\n```diff\nFrom fc68299d436cf87453e432daa77b6d545df4d7ed Mon Sep 17 00:00:00 2001\nFrom: Christian Brabandt <cb@256bit.org>\nDa...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: CVE-2025-34174\nDescription: In pfSense CE /usr/local/www/status_traffic_totals.php, the value of the start-day parameter is not ensured to be a numeric value or sanitized of HTML-related characters/strings before being...
[ { "role": "user", "content": "Review this code change for security implications:\n\nCVE: CVE-2013-7490\nDescription: An issue was discovered in the DBI module before 1.632 for Perl. Using many arguments to methods for Callbacks may lead to memory corruption.\n\n```diff\nFrom a8b98e988d6ea2946f5f56691d6d5ead...