Dataset Viewer
Auto-converted to Parquet Duplicate
id
stringlengths
36
36
code_before
large_stringlengths
69
1.06k
code_after
large_stringlengths
0
1.02k
description
large_stringclasses
7 values
cve
large_stringclasses
4 values
programming_language
large_stringclasses
1 value
cwe
listlengths
0
2
e9b31d7b-8af3-48b2-a73f-3c329e91d5a5
tooltipText: (c: FormatterContext, d: BarChartDatum, e: string) => string; }
) => TooltipContent; }
Description Fava v1.22 have a conversion filter function on income statement dashboard which allow user to perform XSS due to improper validation on filter conversion. Proof of Concept Navigate to Fava demo instance https://fava.pythonanywhere.com/example-beancount-file/income_statement/. Filter on conversion type and ...
TypeScript
[]
e1376893-4ce6-4c5e-9dcc-a3cce0dc27e1
text += ` / ${c.amount(a.budget, a.currency)}`; } text += "<br>"; }); } else {
? `${c.amount(a.value, a.currency)} / ${c.amount( a.budget, a.currency )}` : c.amount(a.value, a.currency) ) ); content.push(domHelpers.br()); }); } else {
Description Fava v1.22 have a conversion filter function on income statement dashboard which allow user to perform XSS due to improper validation on filter conversion. Proof of Concept Navigate to Fava demo instance https://fava.pythonanywhere.com/example-beancount-file/income_statement/. Filter on conversion type and ...
TypeScript
[]
84243f60-0042-40f6-85ed-bce0f11a4666
text += `${c.amount(value, a.currency)}<br>`; }); }
? `${c.amount(a.value, a.currency)} / ${c.amount( a.budget, a.currency )}` : c.amount(a.value, a.currency) ) ); content.push(domHelpers.br()); }); } else {
Description Fava v1.22 have a conversion filter function on income statement dashboard which allow user to perform XSS due to improper validation on filter conversion. Proof of Concept Navigate to Fava demo instance https://fava.pythonanywhere.com/example-beancount-file/income_statement/. Filter on conversion type and ...
TypeScript
[]
e80ee3c3-7b54-4c85-8073-e68f2379ba63
`${c.amount(d.value, d.name)}<em>${day(d.date)}</em>`, }); }
Description Fava v1.22 have a conversion filter function on income statement dashboard which allow user to perform XSS due to improper validation on filter conversion. Proof of Concept Navigate to Fava demo instance https://fava.pythonanywhere.com/example-beancount-file/income_statement/. Filter on conversion type and ...
TypeScript
[]
2256a076-2635-48b1-baff-8734da3448d7
return `1 ${base} = ${c.amount(d.value, quote)}<em>${day(d.date)}</em>`; }, }); }
Description Fava v1.22 have a conversion filter function on income statement dashboard which allow user to perform XSS due to improper validation on filter conversion. Proof of Concept Navigate to Fava demo instance https://fava.pythonanywhere.com/example-beancount-file/income_statement/. Filter on conversion type and ...
TypeScript
[]
e600b8de-b67e-4aa7-ab1c-47bbe3ad3679
node.addEventListener("mouseenter", () => { const t = tooltip(); t.innerHTML = getter(); }); node.addEventListener("mousemove", followMouse);
node.addEventListener("mouseenter", () => { const t = tooltip(); t.replaceChildren(...getter()); }); node.addEventListener("mousemove", followMouse);
Description Fava v1.22 have a conversion filter function on income statement dashboard which allow user to perform XSS due to improper validation on filter conversion. Proof of Concept Navigate to Fava demo instance https://fava.pythonanywhere.com/example-beancount-file/income_statement/. Filter on conversion type and ...
TypeScript
[]
bb3b57fa-46af-4a53-9585-2fd4641bde6e
const matrix = node.getScreenCTM(); if (res && matrix) { const [x, y, content] = res; const t = tooltip(); t.style.opacity = "1"; t.innerHTML = content; t.style.left = `${window.scrollX + x + matrix.e}px`; t.style.top = `${window.scrollY + y + matrix.f - 15}px`; } else { ...
const matrix = node.getScreenCTM(); if (res && matrix) { const [x, y, content] = res; const t = tooltip(); t.style.opacity = "1"; t.replaceChildren(...content); t.style.left = `${window.scrollX + x + matrix.e}px`; t.style.top = `${window.scrollY + y + matrix.f - 15}px`; }...
Description Fava v1.22 have a conversion filter function on income statement dashboard which allow user to perform XSS due to improper validation on filter conversion. Proof of Concept Navigate to Fava demo instance https://fava.pythonanywhere.com/example-beancount-file/income_statement/. Filter on conversion type and ...
TypeScript
[]
5e7f8cea-0167-41cc-8f99-d1ec519b4486
export function initSidebar(): void { const errorCountEl = document.getElementById("error-count"); if (errorCountEl instanceof HTMLLIElement) { errorCount.subscribe((errorCount_val) => { errorCountEl.classList.toggle("hidden", errorCount_val === 0); const span = errorCountEl.querySelector("span"); ...
export function initSidebar(): void { const errorCountEl = document.getElementById("error-count"); if (errorCountEl instanceof HTMLLIElement) { errorCount.subscribe((errorCount_val) => { errorCountEl.classList.toggle("hidden", errorCount_val === 0); const span = errorCountEl.querySelector("span"); ...
Description Fava v1.22 have a conversion filter function on income statement dashboard which allow user to perform XSS due to improper validation on filter conversion. Proof of Concept Navigate to Fava demo instance https://fava.pythonanywhere.com/example-beancount-file/income_statement/. Filter on conversion type and ...
TypeScript
[]
f9f807d1-a6ce-4e3f-9f34-17b9a24be4ff
const onHeadingsChanged = () => { if (!this.parser) { return; } // Clear all numbering items TableOfContentsUtils.clearNumbering(widget.content.node); // Create a new mapping headingToElement = new WeakMap<IMarkdownViewerHeading, Element | null>(); model.headings....
const onHeadingsChanged = () => { if (!this.parser) { return; } // Clear all numbering items TableOfContentsUtils.clearNumbering(widget.content.node); // Create a new mapping headingToElement = new WeakMap<IMarkdownViewerHeading, Element | null>(); model.headings....
jupyterlab is a JupyterLab computational environment. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the Markdown Preview feature. An attacker can access any data that the attacked user has access to, as well as perform arbitrary requests acting as the attacked user by opening a mali...
CVE-2024-22420
TypeScript
[ "CWE-79" ]
c1802fb8-6b0a-4485-9793-8ee84b5d2fc6
export async function getIdForHeading( heading: INotebookHeading, parser: IRenderMime.IMarkdownParser ) { let elementId: string | null = null; if (heading.type === Cell.HeadingType.Markdown) { elementId = await TableOfContentsUtils.Markdown.getHeadingId( parser, // Type from TableOfContentsUtils...
export async function getIdForHeading( heading: INotebookHeading, parser: IRenderMime.IMarkdownParser, sanitizer: IRenderMime.ISanitizer ) { let elementId: string | null = null; if (heading.type === Cell.HeadingType.Markdown) { elementId = await TableOfContentsUtils.Markdown.getHeadingId( parser, ...
jupyterlab is a JupyterLab computational environment. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the Markdown Preview feature. An attacker can access any data that the attacked user has access to, as well as perform arbitrary requests acting as the attacked user by opening a mali...
CVE-2024-22420
TypeScript
[ "CWE-79" ]
30baaa04-e13a-4ca0-ab24-c5fcaa42d3de
const findHeadingElement = (cell: Cell): void => { model.getCellHeadings(cell).forEach(async heading => { const elementId = await getIdForHeading(heading, this.parser!); const selector = elementId ? `h${heading.level}[id="${elementId}"]` : `h${heading.level}`; if ...
const findHeadingElement = (cell: Cell): void => { model.getCellHeadings(cell).forEach(async heading => { const elementId = await getIdForHeading( heading, this.parser!, this.sanitizer ); const selector = elementId ? `h${heading.level}[id="${CSS...
jupyterlab is a JupyterLab computational environment. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the Markdown Preview feature. An attacker can access any data that the attacked user has access to, as well as perform arbitrary requests acting as the attacked user by opening a mali...
CVE-2024-22420
TypeScript
[ "CWE-79" ]
b6d452e7-4a5c-4829-b026-c1cb7e22b2f2
export async function getHeadingId( parser: IMarkdownParser, raw: string, level: number ): Promise<string | null> { try { const innerHTML = await parser.render(raw); if (!innerHTML) { return null; } const container = document.createElement('div'); container.innerHTML = innerHTML; ...
jupyterlab is a JupyterLab computational environment. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the Markdown Preview feature. An attacker can access any data that the attacked user has access to, as well as perform arbitrary requests acting as the attacked user by opening a mali...
CVE-2024-22420
TypeScript
[ "CWE-79" ]
0e9c1dd1-f5c8-412b-bef5-e1b751a1e521
const onHeadingsChanged = () => { if (!this.parser) { return; } // Clear all numbering items TableOfContentsUtils.clearNumbering(widget.content.node); // Create a new mapping headingToElement = new WeakMap<IMarkdownViewerHeading, Element | null>(); model.headings....
const onHeadingsChanged = () => { if (!this.parser) { return; } // Clear all numbering items TableOfContentsUtils.clearNumbering(widget.content.node); // Create a new mapping headingToElement = new WeakMap<IMarkdownViewerHeading, Element | null>(); model.headings....
### Impact The vulnerability depends on user interaction by opening a malicious notebook with Markdown cells, or Markdown file using JupyterLab preview feature. A malicious user can access any data that the attacked user has access to as well as perform arbitrary requests acting as the attacked user. ### Patches Ju...
CVE-2024-22420
TypeScript
[ "CWE-79" ]
ac51f6d0-4cdd-47cd-86ff-83baa82b2918
const findHeadingElement = (cell: Cell): void => { model.getCellHeadings(cell).forEach(async heading => { const elementId = await getIdForHeading(heading, this.parser!); const selector = elementId ? `h${heading.level}[id="${elementId}"]` : `h${heading.level}`; if ...
const findHeadingElement = (cell: Cell): void => { model.getCellHeadings(cell).forEach(async heading => { const elementId = await getIdForHeading( heading, this.parser!, this.sanitizer ); const selector = elementId ? `h${heading.level}[id="${CSS...
### Impact The vulnerability depends on user interaction by opening a malicious notebook with Markdown cells, or Markdown file using JupyterLab preview feature. A malicious user can access any data that the attacked user has access to as well as perform arbitrary requests acting as the attacked user. ### Patches Ju...
CVE-2024-22420
TypeScript
[ "CWE-79" ]
b84ff991-f701-445c-96da-4e750350adcc
export async function getIdForHeading( heading: INotebookHeading, parser: IRenderMime.IMarkdownParser ) { let elementId: string | null = null; if (heading.type === Cell.HeadingType.Markdown) { elementId = await TableOfContentsUtils.Markdown.getHeadingId( parser, // Type from TableOfContentsUtils...
export async function getIdForHeading( heading: INotebookHeading, parser: IRenderMime.IMarkdownParser, sanitizer: IRenderMime.ISanitizer ) { let elementId: string | null = null; if (heading.type === Cell.HeadingType.Markdown) { elementId = await TableOfContentsUtils.Markdown.getHeadingId( parser, ...
### Impact The vulnerability depends on user interaction by opening a malicious notebook with Markdown cells, or Markdown file using JupyterLab preview feature. A malicious user can access any data that the attacked user has access to as well as perform arbitrary requests acting as the attacked user. ### Patches Ju...
CVE-2024-22420
TypeScript
[ "CWE-79" ]
dc898b45-79f4-4993-82b6-033553c60531
export async function getHeadingId( parser: IMarkdownParser, raw: string, level: number ): Promise<string | null> { try { const innerHTML = await parser.render(raw); if (!innerHTML) { return null; } const container = document.createElement('div'); container.innerHTML = innerHTML; ...
### Impact The vulnerability depends on user interaction by opening a malicious notebook with Markdown cells, or Markdown file using JupyterLab preview feature. A malicious user can access any data that the attacked user has access to as well as perform arbitrary requests acting as the attacked user. ### Patches Ju...
CVE-2024-22420
TypeScript
[ "CWE-79" ]
74f71535-20ba-40f2-bfef-1d4c17bf40d8
void context.ready.then(async () => { const file = context.model; const workspace = file.toJSON() as unknown as Workspace.IWorkspace; const path = context.path; const id = workspace.metadata.id; // Save the file contents as a workspace. await this._workspaces.save(...
void context.ready.then(async () => { const file = context.model; const workspace = file.toJSON() as unknown as Workspace.IWorkspace; const path = context.path; const id = workspace.metadata.id; // Save the file contents as a workspace. await this._workspaces.save(...
jupyterlab is a JupyterLab computational environment. Affected versions of this package are vulnerable to Information Exposure due to improper handling of Authorization and XSRFToken headers. An attacker can expose sensitive tokens to a third party by convincing a user to click on a malicious link when running an old v...
CVE-2024-22421
TypeScript
[ "CWE-200", "CWE-23" ]
25ef9bbd-48e6-40d2-96a2-6f7b63cf6200
export function getSessionUrl(baseUrl: string, id: string): string { return URLExt.join(baseUrl, SESSION_SERVICE_URL, id); }
export function getSessionUrl(baseUrl: string, id: string): string { const servicesBase = URLExt.join(baseUrl, SESSION_SERVICE_URL); const result = URLExt.join(servicesBase, id); if (!result.startsWith(servicesBase)) { throw new Error('Can only be used for services requests'); } return result; }
jupyterlab is a JupyterLab computational environment. Affected versions of this package are vulnerable to Information Exposure due to improper handling of Authorization and XSRFToken headers. An attacker can expose sensitive tokens to a third party by convincing a user to click on a malicious link when running an old v...
CVE-2024-22421
TypeScript
[ "CWE-200", "CWE-23" ]
c5c0d607-fe35-4c29-82b8-8921d6bc3055
void context.ready.then(async () => { const file = context.model; const workspace = (file.toJSON() as unknown) as Workspace.IWorkspace; const path = context.path; const id = workspace.metadata.id; // Save the file contents as a workspace. await this._workspaces.sav...
void context.ready.then(async () => { const file = context.model; const workspace = (file.toJSON() as unknown) as Workspace.IWorkspace; const path = context.path; const id = workspace.metadata.id; // Save the file contents as a workspace. await this._workspaces.sav...
jupyterlab is a JupyterLab computational environment. Affected versions of this package are vulnerable to Information Exposure due to improper handling of Authorization and XSRFToken headers. An attacker can expose sensitive tokens to a third party by convincing a user to click on a malicious link when running an old v...
CVE-2024-22421
TypeScript
[ "CWE-200", "CWE-23" ]
fef42cc3-eea8-43d4-aaeb-d374fad4ff10
export function getSessionUrl(baseUrl: string, id: string): string { return URLExt.join(baseUrl, SESSION_SERVICE_URL, id); }
export function getSessionUrl(baseUrl: string, id: string): string { const servicesBase = URLExt.join(baseUrl, SESSION_SERVICE_URL); const result = URLExt.join(servicesBase, id); if (!result.startsWith(servicesBase)) { throw new Error('Can only be used for services requests'); } return result; }
jupyterlab is a JupyterLab computational environment. Affected versions of this package are vulnerable to Information Exposure due to improper handling of Authorization and XSRFToken headers. An attacker can expose sensitive tokens to a third party by convincing a user to click on a malicious link when running an old v...
CVE-2024-22421
TypeScript
[ "CWE-200", "CWE-23" ]
eb128074-8c7a-4fe4-b788-08043b185176
void context.ready.then(async () => { const file = context.model; const workspace = file.toJSON() as unknown as Workspace.IWorkspace; const path = context.path; const id = workspace.metadata.id; // Save the file contents as a workspace. await this._workspaces.save(...
void context.ready.then(async () => { const file = context.model; const workspace = file.toJSON() as unknown as Workspace.IWorkspace; const path = context.path; const id = workspace.metadata.id; // Save the file contents as a workspace. await this._workspaces.save(...
### Impact Users of JupyterLab who click on a malicious link may get their `Authorization` and `XSRFToken` tokens exposed to a third party when running an older `jupyter-server` version. ### Patches JupyterLab 4.1.0b2, 4.0.11, and 3.6.7 were patched. ### Workarounds No workaround has been identified, however users sh...
CVE-2024-22421
TypeScript
[ "CWE-200", "CWE-23" ]
2170ce7c-eb96-4176-94fc-c7abf7c0bf20
export function getSessionUrl(baseUrl: string, id: string): string { return URLExt.join(baseUrl, SESSION_SERVICE_URL, id); }
export function getSessionUrl(baseUrl: string, id: string): string { const servicesBase = URLExt.join(baseUrl, SESSION_SERVICE_URL); const result = URLExt.join(servicesBase, id); if (!result.startsWith(servicesBase)) { throw new Error('Can only be used for services requests'); } return result; }
### Impact Users of JupyterLab who click on a malicious link may get their `Authorization` and `XSRFToken` tokens exposed to a third party when running an older `jupyter-server` version. ### Patches JupyterLab 4.1.0b2, 4.0.11, and 3.6.7 were patched. ### Workarounds No workaround has been identified, however users sh...
CVE-2024-22421
TypeScript
[ "CWE-200", "CWE-23" ]
7ad44889-2058-4ad3-bed8-cf33379f5e1f
export const getLogDetail = async (url: string) => { url = getLogUrl(url); const rsp = await get(url); if (rsp.headers["content-type"]?.includes("html")) { const el = document.createElement("div"); el.innerHTML = rsp.data; const arr = [].map.call( el.getElementsByTagName("li"), (li: HTMLLI...
ray is an A system for parallel and distributed Python that unifies the ML ecosystem. Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) through the dashboard API, via the url parameter of the /log_proxy API endpoint. An attacker can retrieve the highly privileged IAM credentials req...
CVE-2023-48022
TypeScript
[ "CWE-918" ]
4aa3340a-93e0-403a-bc59-439fc08fa0cc
export const getLogDownloadUrl = (url: string) => { url = getLogUrl(url); if (url === "log_index") { return undefined; } return url; };
ray is an A system for parallel and distributed Python that unifies the ML ecosystem. Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) through the dashboard API, via the url parameter of the /log_proxy API endpoint. An attacker can retrieve the highly privileged IAM credentials req...
CVE-2023-48022
TypeScript
[ "CWE-918" ]
feab85ec-1790-421f-b4b7-6c5eecc65f9b
export const getLogDetail = async (url: string) => { url = getLogUrl(url); const rsp = await get(url); if (rsp.headers["content-type"]?.includes("html")) { const el = document.createElement("div"); el.innerHTML = rsp.data; const arr = [].map.call( el.getElementsByTagName("li"), (li: HTMLLI...
Description Attackers can read any file on the system with the permissions of the user that started the Ray Dashboard. Proof of Concept GET /api/v0/logs/file?node_id=56424ecdb00cf570f0831aa698dd7c44e527a20212d2fa27078c7f79&filename=../../../../../etc%2fpasswd&lines=50000 HTTP/1.1 Host: localhost:8265 User-Agent: Mozill...
TypeScript
[]
2c7a3ffb-9a3a-422e-955c-8de582386d4b
export const getLogDownloadUrl = (url: string) => { url = getLogUrl(url); if (url === "log_index") { return undefined; } return url; };
Description Attackers can read any file on the system with the permissions of the user that started the Ray Dashboard. Proof of Concept GET /api/v0/logs/file?node_id=56424ecdb00cf570f0831aa698dd7c44e527a20212d2fa27078c7f79&filename=../../../../../etc%2fpasswd&lines=50000 HTTP/1.1 Host: localhost:8265 User-Agent: Mozill...
TypeScript
[]
README.md exists but content is empty.
Downloads last month
16