Datasets:
cve_id stringlengths 13 16 | hash stringlengths 40 40 | repo_url stringlengths 25 73 | cve_description stringlengths 64 3.9k | cvss2_base_score float64 1.2 10 ⌀ | cvss3_base_score float64 2.2 10 ⌀ | published_date stringdate 1999-06-23 04:00:00 2024-07-22 18:15:00 | severity stringclasses 4
values | cwe_id stringclasses 269
values | cwe_name stringclasses 269
values | cwe_description stringclasses 268
values | commit_message stringlengths 0 46.8k | commit_date stringlengths 25 25 | version_tag stringlengths 3 36 | repo_total_files int64 1 169k ⌀ | repo_total_commits int64 2 1.4M ⌀ | file_paths listlengths 0 53.6k | language stringclasses 27
values | diff_stats stringlengths 2 4.23M | diff_with_context stringlengths 0 654M | vulnerable_code stringlengths 0 55.3M | fixed_code stringlengths 0 622M | security_keywords listlengths 0 5 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2024-24746 | d42a0ebe6632bd0c318560e4293a522634f60594 | https://github.com/apache/mynewt-nimble | [{'lang': 'en', 'value': "Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in Apache NimBLE.\xa0\n\nSpecially crafted GATT operation can cause infinite loop in GATT server leading to denial of service in Bluetooth stack or device.\n\nThis issue affects Apache NimBLE: through 1.6.0.\nUsers are recomm... | null | null | 2024-04-06T12:15Z | nan | CWE-835 | Loop with Unreachable Exit Condition ('Infinite Loop') | The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop. | nimble/host: Fix disconnect on host connection timeout
We don't need to have double loop and lock-unlock host lock when
issuing disconnect. ble_gap_terminate_with_conn() can be used
to disconnect and it can be called with already provided conn object
under host lock.
| 2024-02-14 21:27:16 +0100 | d42a0ebe | 1,024 | 2 | [
"nimble/host/src/ble_hs_conn.c"
] | C | {"nimble/host/src/ble_hs_conn.c": {"lines_added": 49, "lines_deleted": 62}} | diff --git a/nimble/host/src/ble_hs_conn.c b/nimble/host/src/ble_hs_conn.c
index 9b7bdbb3..57ba16af 100644
--- a/nimble/host/src/ble_hs_conn.c
+++ b/nimble/host/src/ble_hs_conn.c
@@ -475,90 +475,77 @@ ble_hs_conn_timer(void)
return BLE_HS_FOREVER;
#endif
struct ble_hs_conn *conn;
- ble_npl_time_t now;... | ble_npl_time_t now;
int32_t next_exp_in;
uint16_t conn_handle;
for (;;) {
conn_handle = BLE_HS_CONN_HANDLE_NONE;
next_exp_in = BLE_HS_FOREVER;
now = ble_npl_time_get();
ble_hs_lock();
/* This loop performs one of two tasks:
* 1. Determine if any connecti... | ble_npl_time_t now = ble_npl_time_get();
int32_t next_exp_in = BLE_HS_FOREVER;
int32_t next_exp_in_new;
bool next_exp_in_updated;
ble_hs_lock();
/* This loop performs one of two tasks:
* 1. Determine if any connections need to be terminated due to timeout. If
* so connection is disc... | [] |
CVE-2020-7763 | b5d2da2639a49a95e0bdb3bc0c987cb6406b8259 | https://github.com/pofider/phantom-html-to-pdf | [{'lang': 'en', 'value': 'This affects the package phantom-html-to-pdf before 0.6.1.'}] | 5 | 7.5 | 2020-11-05T14:15Z | MEDIUM | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the... | fix access to files without protocol
| 2020-11-02 15:51:26 +0100 | b5d2da2 | 20 | 2 | [
"lib/scripts/conversionScriptPart.js",
"test/test.js"
] | JavaScript | {"lib/scripts/conversionScriptPart.js": {"lines_added": 7, "lines_deleted": 7}, "test/test.js": {"lines_added": 33, "lines_deleted": 18}} | diff --git a/lib/scripts/conversionScriptPart.js b/lib/scripts/conversionScriptPart.js
index 20c8f42..044ab07 100644
--- a/lib/scripts/conversionScriptPart.js
+++ b/lib/scripts/conversionScriptPart.js
@@ -17,23 +17,23 @@ if(body.cookies.length > 0) {
page.onResourceRequested = function (request, networkRequest) {
... | }
//potentially dangerous request
if (request.url.lastIndexOf("file:///", 0) === 0 && !body.allowLocalFilesAccess) {
networkRequest.abort();
return;
}
var should = require("should"),
fs = require("fs"),
});
it('should create a pdf file ignoring ssl errors', function... | }
//potentially dangerous request
if (request.url.lastIndexOf("http://", 0) !== 0 && request.url.lastIndexOf("https://", 0) && !body.allowLocalFilesAccess) {
networkRequest.abort();
return;
}
var should = require("should"),
fs = require("fs"),
});
... | [] |
CVE-2023-51665 | 728496010cbfcee5b7b54001c9f79e02ede30d82 | https://github.com/advplyr/audiobookshelf | [{'lang': 'en', 'value': 'Audiobookshelf is a self-hosted audiobook and podcast server. Prior to 2.7.0, Audiobookshelf is vulnerable to unauthenticated blind server-side request (SSRF) vulnerability in Auth.js. This vulnerability has been addressed in version 2.7.0. There are no known workarounds for this vulnerability... | null | 7.5 | 2023-12-27T18:15Z | nan | CWE-918 | Server-Side Request Forgery (SSRF) | The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination. | Update:/auth/openid/config API endpoint to require admin user and validate issuer URL
| 2023-12-17 10:41:39 -0600 | 72849601 | 934 | 2 | [
"server/Auth.js"
] | JavaScript | {"server/Auth.js": {"lines_added": 27, "lines_deleted": 6}} | diff --git a/server/Auth.js b/server/Auth.js
index 0a282c9c..d2334de2 100644
--- a/server/Auth.js
+++ b/server/Auth.js
@@ -294,11 +294,11 @@ class Auth {
// We will allow if it is in the whitelist, by saving it into this.openIdAuthSession and setting the redirect uri to /auth/openid/mobile-redirect
//... | (Database.serverSettings.authOpenIDMobileRedirectURIs.length === 1 && Database.serverSettings.authOpenIDMobileRedirectURIs[0] === '*')) {
* Used to auto-populate the openid URLs in config/authentication
router.get('/auth/openid/config', async (req, res) => {
const configUrl = `${issuerUrl... | (Database.serverSettings.authOpenIDMobileRedirectURIs.length === 1 && Database.serverSettings.authOpenIDMobileRedirectURIs[0] === '*')) {
* Helper route used to auto-populate the openid URLs in config/authentication
* Takes an issuer URL as a query param and requests the config data at "/.well-kn... | [
"validation",
"authentication"
] |
CVE-2023-51697 | f2f2ea161ca0701e1405e737b0df0f96296e4f64 | https://github.com/advplyr/audiobookshelf | [{'lang': 'en', 'value': 'Audiobookshelf is a self-hosted audiobook and podcast server. Prior to 2.7.0, Audiobookshelf is vulnerable to unauthenticated blind server-side request (SSRF) vulnerability in `podcastUtils.js`. This vulnerability has been addressed in version 2.7.0. There are no known workarounds for this vul... | null | 7.5 | 2023-12-27T18:15Z | nan | CWE-918 | Server-Side Request Forgery (SSRF) | The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination. | Update:API endpoint /podcasts/feed validates rssFeed URL and uses SSRF req filter
| 2023-12-17 12:00:11 -0600 | f2f2ea16 | 934 | 2 | [
"server/controllers/PodcastController.js",
"server/utils/index.js",
"server/utils/podcastUtils.js"
] | JavaScript | {"server/controllers/PodcastController.js": {"lines_added": 12, "lines_deleted": 2}, "server/utils/index.js": {"lines_added": 22, "lines_deleted": 6}, "server/utils/podcastUtils.js": {"lines_added": 23, "lines_deleted": 5}} | diff --git a/server/controllers/PodcastController.js b/server/controllers/PodcastController.js
index 035f9152..e476efd5 100644
--- a/server/controllers/PodcastController.js
+++ b/server/controllers/PodcastController.js
@@ -4,10 +4,11 @@ const Database = require('../Database')
const fs = require('../libs/fsExtra')
... | var url = req.body.rssFeed
return res.status(400).send('Bad request')
Array(str1.length + 1).fill(null));
track[0][i] = i;
track[j][0] = j;
const indicator = str1[i - 1] === str2[j - 1] ? 0 : 1;
);
return track[str2.length][str1.length];
const Logger = require('../Logger')
return a... | const { validateUrl } = require('../utils/index')
/**
* POST: /api/podcasts/feed
*
* @typedef getPodcastFeedReqBody
* @property {string} rssFeed
*
* @param {import('express').Request<{}, {}, getPodcastFeedReqBody, {}} req
* @param {import('express').Response} res
*/
const url = validat... | [
"sanitization",
"validation"
] |
CVE-2024-35236 | ce7f891b9b2cb57c6644aaf96f89a8bda6307664 | https://github.com/advplyr/audiobookshelf | [{'lang': 'en', 'value': 'Audiobookshelf is a self-hosted audiobook and podcast server. Prior to version 2.10.0, opening an ebook with malicious scripts inside leads to code execution inside the browsing context. Attacking a user with high privileges (upload, creation of libraries) can lead to remote code execution (RC... | null | null | 2024-05-27T17:15Z | nan | NVD-CWE-noinfo | Insufficient Information | There is insufficient information about the issue to classify it; details are unkown or unspecified. | Update:Disable epubs from running scripts by default, add library setting to enable it GHSA-7j99-76cj-q9pg
| 2024-05-26 16:01:08 -0500 | ce7f891b9 | 934 | 2 | [
"client/components/modals/libraries/LibrarySettings.vue",
"client/components/readers/EpubReader.vue",
"client/store/libraries.js",
"client/strings/bg.json",
"client/strings/bn.json",
"client/strings/cs.json",
"client/strings/da.json",
"client/strings/de.json",
"client/strings/en-us.json",
"client/... | JSON | {"client/components/modals/libraries/LibrarySettings.vue": {"lines_added": 15, "lines_deleted": 1}, "client/components/readers/EpubReader.vue": {"lines_added": 4, "lines_deleted": 1}, "client/store/libraries.js": {"lines_added": 29, "lines_deleted": 25}, "client/strings/bg.json": {"lines_added": 2, "lines_deleted": 0},... | diff --git a/client/components/modals/libraries/LibrarySettings.vue b/client/components/modals/libraries/LibrarySettings.vue
index 4183c4fe4..3808ed07b 100644
--- a/client/components/modals/libraries/LibrarySettings.vue
+++ b/client/components/modals/libraries/LibrarySettings.vue
@@ -58,10 +58,21 @@
<span ... | </script>
allowScriptedContent: true,
getCurrentLibrary: state => {
return state.libraries.find(lib => lib.id === state.currentLibraryId)
getSortedLibraries: state => () => {
return state.libraries.map(lib => ({ ...lib })).sort((a, b) => a.displayOrder - b.displayOrder)
getLibraryProvider: state =... | <div v-if="isBookLibrary" class="py-3">
<div class="flex items-center">
<ui-toggle-switch v-model="epubsAllowScriptedContent" @input="formUpdated" />
<ui-tooltip :text="$strings.LabelSettingsEpubsAllowScriptedContentHelp">
<p class="pl-4 text-base">
{{ $strings.LabelSetti... | [] |
CVE-2021-4265 | 924d16008cfcc09356c87db01848e45290cb58ca | https://github.com/siwapp/siwapp-ror | [{'lang': 'en', 'value': 'A vulnerability was found in siwapp-ror. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to cross site scripting. The attack may be initiated remotely. The name of the patch is 924d16008cfcc09356c87db01848e45290cb58ca. It is recommended to a... | null | 6.1 | 2022-12-21T19:15Z | nan | CWE-79 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. | Fix possible XSS issues (#365)
* some fixes for old migrations, that allows new migrations
* force ssl default true unless env var
* check address no html tags | 2021-10-19 11:07:49 +0200 | 924d160 | 334 | 2 | [
"app/models/common.rb",
"app/models/customer.rb",
"config/environments/production.rb",
"db/migrate/20160907152236_default_for_enabled.rb",
"db/migrate/20160908093323_add_indexes_on_deleted_column.rb",
"db/migrate/20160913081503_remove_status_from_commons.rb",
"db/migrate/20160915000824_add_active_to_cus... | Ruby | {"app/models/common.rb": {"lines_added": 4, "lines_deleted": 0}, "app/models/customer.rb": {"lines_added": 4, "lines_deleted": 0}, "config/environments/production.rb": {"lines_added": 1, "lines_deleted": 1}, "db/migrate/20160907152236_default_for_enabled.rb": {"lines_added": 1, "lines_deleted": 1}, "db/migrate/20160908... | diff --git a/app/models/common.rb b/app/models/common.rb
index 0c70c1d..388d781 100644
--- a/app/models/common.rb
+++ b/app/models/common.rb
@@ -29,10 +29,14 @@ class Common < ActiveRecord::Base
validates :series, presence: true
# from https://emailregex.com/
validates :email,
format: {with: /\A([a-zA-Z0-... | # config.force_ssl = true
class DefaultForEnabled < ActiveRecord::Migration
class AddIndexesOnDeletedColumn < ActiveRecord::Migration
class RemoveStatusFromCommons < ActiveRecord::Migration
class AddActiveToCustomer < ActiveRecord::Migration
class AddFailedToCommons < ActiveRecord::Migration
class SeriesFirstNumber <... | validates :invoicing_address, format: { without: /<(.*)>.*?|<(.*) \/>/,
message: "wrong format" }
validates :shipping_address, format: { without: /<(.*)>.*?|<(.*) \/>/,
message: "wrong format" }
validates :invoicing_address, format: { without: /<(.*)>.*?|<(.*) \/>/,
message: "Wrong address format" }
... | [
"validation"
] |
CVE-2017-16876 | 5f06d724bc05580e7f203db2d4a4905fc1127f98 | https://github.com/lepture/mistune | [{'lang': 'en', 'value': 'Cross-site scripting (XSS) vulnerability in the _keyify function in mistune.py in Mistune before 0.8.1 allows remote attackers to inject arbitrary web script or HTML by leveraging failure to escape the "key" argument.'}] | 4.3 | 6.1 | 2017-12-29T15:29Z | MEDIUM | CWE-79 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. | Fix CVE-2017-16876
| 2017-11-21 00:15:09 +0900 | 5f06d72 | 127 | 3 | [
"mistune.py"
] | Python | {"mistune.py": {"lines_added": 5, "lines_deleted": 3}} | diff --git a/mistune.py b/mistune.py
index d6ecf7e..5b05fcb 100644
--- a/mistune.py
+++ b/mistune.py
@@ -9,11 +9,11 @@
"""
import re
import inspect
-__version__ = '0.8'
+__version__ = '0.8.1'
__author__ = 'Hsiaoming Yang <me@lepture.com>'
__all__ = [
'BlockGrammar', 'BlockLexer',
'InlineGrammar', 'In... | __version__ = '0.8'
return _key_pattern.sub(' ', key.lower())
r'<(\w+%s)((?:%s)*?)\s*>([\s\S]*?)<\/\1>' % (_valid_end, _valid_attr), | __version__ = '0.8.1'
key = escape(key.lower(), quote=True)
return _key_pattern.sub(' ', key)
r'<(\w+%s)((?:%s)*?)\s*>([\s\S]*?)<\/\1>' % (
_valid_end, _valid_attr), | [] |
CVE-2022-21159 | cfa94cbf10302bedc779703f874ee2e8387a0721 | https://github.com/mz-automation/libiec61850 | [{'lang': 'en', 'value': 'A denial of service vulnerability exists in the parseNormalModeParameters functionality of MZ Automation GmbH libiec61850 1.5.0. A specially-crafted series of network requests can lead to denial of service. An attacker can send a sequence of malformed iec61850 messages to trigger this vulnerab... | 5 | 7.5 | 2022-04-15T16:15Z | MEDIUM | CWE-835 | Loop with Unreachable Exit Condition ('Infinite Loop') | The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop. | - fixed - Bug in presentation layer parser can cause infinite loop (LIB61850-302)
| 2022-02-25 18:21:45 +0100 | cfa94cb | 896 | 3 | [
"src/mms/iso_presentation/iso_presentation.c"
] | C | {"src/mms/iso_presentation/iso_presentation.c": {"lines_added": 4, "lines_deleted": 0}} | diff --git a/src/mms/iso_presentation/iso_presentation.c b/src/mms/iso_presentation/iso_presentation.c
index 96fd8a3..e2ee12a 100644
--- a/src/mms/iso_presentation/iso_presentation.c
+++ b/src/mms/iso_presentation/iso_presentation.c
@@ -467,10 +467,14 @@ parseNormalModeParameters(IsoPresentation* self, uint8_t* buffer,... |
if (bufPos < 0)
return -1;
| [] | |
CVE-2022-3976 | 10622ba36bb3910c151348f1569f039ecdd8786f | https://github.com/mz-automation/libiec61850 | [{'lang': 'en', 'value': 'A vulnerability has been found in MZ Automation libiec61850 up to 1.4 and classified as critical. This vulnerability affects unknown code of the file src/mms/iso_mms/client/mms_client_files.c of the component MMS File Services. The manipulation of the argument filename leads to path traversal.... | null | 8.8 | 2022-11-13T14:15Z | nan | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the... | - fixed path traversal vulnerability in MMS file services (LIB61850-357)
| 2022-10-07 17:09:11 +0100 | 10622ba3 | 896 | 3 | [
"hal/filesystem/linux/file_provider_linux.c",
"src/mms/inc_private/mms_common_internal.h",
"src/mms/iso_mms/client/mms_client_files.c",
"src/mms/iso_mms/common/mms_common_msg.c",
"src/mms/iso_mms/server/mms_file_service.c"
] | C | {"hal/filesystem/linux/file_provider_linux.c": {"lines_added": 0, "lines_deleted": 1}, "src/mms/inc_private/mms_common_internal.h": {"lines_added": 3, "lines_deleted": 0}, "src/mms/iso_mms/client/mms_client_files.c": {"lines_added": 30, "lines_deleted": 21}, "src/mms/iso_mms/common/mms_common_msg.c": {"lines_added": 19... | diff --git a/hal/filesystem/linux/file_provider_linux.c b/hal/filesystem/linux/file_provider_linux.c
index dc869d96..7b501f00 100644
--- a/hal/filesystem/linux/file_provider_linux.c
+++ b/hal/filesystem/linux/file_provider_linux.c
@@ -35,11 +35,10 @@
struct sDirectoryHandle {
DIR* handle;
};
-
FileHandle
F... |
MmsFileReadStateMachine* frsm = getFreeFrsm(connection);
if (frsm != NULL) {
MmsOutstandingCall obtainFileCall = mmsClient_getMatchingObtainFileRequest(connection, filename);
if (obtainFileCall) {
if (DEBUG_MMS_CLIENT)
printf("MMS_CLIENT: fil... | LIB61850_INTERNAL bool
mmsMsg_isFilenameSave(const char* filename);
if (mmsMsg_isFilenameSave(filename) == false) {
/* potential attack */
if (DEBUG_MMS_CLIENT)
printf("MMS_CLIENT: client provided unsave filename -> rejected\n");
mmsMsg_createServiceErrorPdu... | [] |
CVE-2023-27772 | 79a8eaf26070e02044afc4b2ffbfe777dfdf3e0b | https://github.com/mz-automation/libiec61850 | [{'lang': 'en', 'value': 'libiec61850 v1.5.1 was discovered to contain a segmentation violation via the function ControlObjectClient_setOrigin() at /client/client_control.c.'}] | null | 7.5 | 2023-04-13T18:15Z | nan | CWE-754 | Improper Check for Unusual or Exceptional Conditions | The product does not check or incorrectly checks for unusual or exceptional conditions that are not expected to occur frequently during day to day operation of the product. | - added missing checks in iec61850_client_example_control (#442)
| 2023-02-24 11:07:09 +0000 | 79a8eaf2 | 896 | 3 | [
"examples/iec61850_client_example_control/client_example_control.c"
] | C | {"examples/iec61850_client_example_control/client_example_control.c": {"lines_added": 106, "lines_deleted": 77}} | diff --git a/examples/iec61850_client_example_control/client_example_control.c b/examples/iec61850_client_example_control/client_example_control.c
index 33da635a..37d6b6bc 100644
--- a/examples/iec61850_client_example_control/client_example_control.c
+++ b/examples/iec61850_client_example_control/client_example_control... | if (error == IED_ERROR_OK) {
MmsValue* ctlVal = MmsValue_newBoolean(true);
ControlObjectClient_setOrigin(control, NULL, 3);
if (ControlObjectClient_operate(control, ctlVal, 0 /* operate now */)) {
printf("simpleIOGenericIO/GGIO1.SPCSO1 operated successfully\n");
}
... | if (error == IED_ERROR_OK)
{
MmsValue* ctlVal = NULL;
MmsValue* stVal = NULL;
if (control)
{
ctlVal = MmsValue_newBoolean(true);
ControlObjectClient_setOrigin(control, NULL, 3);
if (ControlObjectClient_operate(control, ctlVal, 0 /* operate now ... | [
"validation"
] |
CVE-2019-25087 | 1a0de56e4dafff9c2f9c8f6b130a764f7a50df52 | https://github.com/RamseyK/httpserver | [{'lang': 'en', 'value': "A vulnerability was found in RamseyK httpserver. It has been rated as critical. This issue affects the function ResourceHost::getResource of the file src/ResourceHost.cpp of the component URI Handler. The manipulation of the argument uri leads to path traversal: '../filedir'. The attack may be... | null | 7.5 | 2022-12-27T09:15Z | nan | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the... | Deny any directory traversal paths. README update
| 2019-09-08 11:23:20 -0500 | 1a0de56 | 26 | 2 | [
"README.md",
"src/HTTPServer.cpp",
"src/ResourceHost.cpp"
] | C++ | {"README.md": {"lines_added": 4, "lines_deleted": 1}, "src/HTTPServer.cpp": {"lines_added": 1, "lines_deleted": 1}, "src/ResourceHost.cpp": {"lines_added": 3, "lines_deleted": 0}} | diff --git a/README.md b/README.md
index ec0ba22..db89830 100755
--- a/README.md
+++ b/README.md
@@ -1,15 +1,18 @@
# HTTP Server
Ramsey Kant
https://github.com/RamseyK/httpserver
-A high performance, single threaded, HTTP server written in C++ to serve as a kqueue socket management and HTTP protocol learning too... | A high performance, single threaded, HTTP server written in C++ to serve as a kqueue socket management and HTTP protocol learning tool
std::cout << req->getHeaderStr(i) << std::endl; | A high performance, single threaded, HTTP server written in C++ to serve as a kqueue socket management and HTTP protocol learning tool on BSD systems
## Compiling Notes
* On FreeBSD, compile with gmake
std::cout << "\t" << req->getHeaderStr(i) << std::endl;
if (uri.find("../") != std::string::npos)
return NULL;
| [] |
CVE-2014-2829 | 586d96cc12ef218243a3466354b4d208b5472a6c | https://github.com/esl/MongooseIM | [{'lang': 'en', 'value': 'Erlang Solutions MongooseIM through 1.3.1 rev. 2 does not properly restrict the processing of compressed XML elements, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XMPP stream, aka an "xmppbomb" attack.'}] | 7.8 | null | 2014-04-11T01:55Z | HIGH | CWE-264 | Permissions, Privileges, and Access Controls | Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control. | Merge pull request #167 from esl/zlib_cwe400_fix
Add zlib inflated data size limit | 2014-04-09 15:05:37 +0200 | 586d96cc | 1,451 | 3 | [] | Unknown | {"apps/ejabberd/c_src/ejabberd_zlib_drv.c": {"lines_added": 79, "lines_deleted": 72}, "apps/ejabberd/src/ejabberd_c2s.erl": {"lines_added": 20, "lines_deleted": 18}, "apps/ejabberd/src/ejabberd_receiver.erl": {"lines_added": 10, "lines_deleted": 2}, "apps/ejabberd/src/ejabberd_socket.erl": {"lines_added": 4, "lines_del... | [] | |||
CVE-2020-15084 | 7ecab5f8f0cab5297c2b863596566eb0c019cdef | https://github.com/auth0/express-jwt | [{'lang': 'en', 'value': 'In express-jwt (NPM package) up and including version 5.3.3, the algorithms entry to be specified in the configuration is not being enforced. When algorithms is not specified in the configuration, with the combination of jwks-rsa, it may lead to authorization bypass. You are affected by this v... | 4.3 | 9.1 | 2020-06-30T16:15Z | MEDIUM | CWE-863 | Incorrect Authorization | The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions. | Merge pull request from GHSA-6g6m-m6h5-w9gf
Made algorithms mandatory | 2020-06-29 16:36:49 -0300 | 7ecab5f | 20 | 3 | [] | Unknown | {"lib/index.js": {"lines_added": 3, "lines_deleted": 0}, "package.json": {"lines_added": 1, "lines_deleted": 1}, "test/jwt.test.js": {"lines_added": 46, "lines_deleted": 29}, "test/multitenancy.test.js": {"lines_added": 4, "lines_deleted": 2}, "test/revocation.test.js": {"lines_added": 2, "lines_deleted": 0}, "test/str... | [] | |||
CVE-2016-7149 | 9a4ab85439d1b838ee7b8eeebbf59174bb787811 | https://github.com/b2evolution/b2evolution | [{'lang': 'en', 'value': 'Cross-site scripting (XSS) vulnerability in b2evolution 6.7.5 and earlier allows remote attackers to inject arbitrary web script or HTML via vectors related to the autolink function.'}] | 4.3 | 6.1 | 2017-01-18T17:59Z | MEDIUM | CWE-79 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. | Fix autolink function to avoid XSS issue
| 2016-08-12 18:11:18 +0300 | 9a4ab8543 | 2,948 | 3 | [
"_tests/blogs/evocore/misc.funcs.simpletest.php",
"inc/_core/_misc.funcs.php"
] | PHP | {"_tests/blogs/evocore/misc.funcs.simpletest.php": {"lines_added": 3, "lines_deleted": 0}, "inc/_core/_misc.funcs.php": {"lines_added": 4, "lines_deleted": 4}} | diff --git a/_tests/blogs/evocore/misc.funcs.simpletest.php b/_tests/blogs/evocore/misc.funcs.simpletest.php
index cd2fe71cb..a58d5b943 100644
--- a/_tests/blogs/evocore/misc.funcs.simpletest.php
+++ b/_tests/blogs/evocore/misc.funcs.simpletest.php
@@ -52,10 +52,13 @@ class MiscFuncsTestCase extends EvoUnitTestCase
... | array( '#(^|[\s>\(]|\[url=)(https?|mailto)://([^<>{}\s]+[^.,:;!\?<>{}\s\]\)])#i',
'#(^|[\s>\(]|\[url=)aim:([^,<\s\]\)]+)#i',
'#(^|[\s>\(]|\[url=)www\.'.$pattern_domain.'([^<>{}\s]*[^.,:;!\?\s\]\)])#i',
'#(^|[\s>\(]|\[url=)([a-z0-9\-_.]+?)@'.$pattern_domain.'([^.,:;!\?<\s\]\)]+)#i', ), |
// XSS sample:
'text http://test_url.test"onmouseover="alert(1)"onerror=1 "text' => 'text <a href="http://test_url.test">http://test_url.test</a>"onmouseover="alert(1)"onerror=1 "text',
array( '#(^|[\s>\(]|\[url=)(https?|mailto)://([^"<>{}\s]+[^".,:;!\?<>{}\s\]\)])#i',
'#(^|[\s>\(]|\[url=)aim:([^",<\s\]\)... | [] |
CVE-2016-7150 | dd975fff7fce81bf12f9c59edb1a99475747c83c | https://github.com/b2evolution/b2evolution | [{'lang': 'en', 'value': 'Cross-site scripting (XSS) vulnerability in b2evolution 6.7.5 and earlier allows remote authenticated users to inject arbitrary web script or HTML via the site name.'}] | 3.5 | 5.4 | 2017-01-18T17:59Z | LOW | CWE-79 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. | Fix XSS vulnerability on "site name"
| 2016-08-12 18:24:55 +0300 | dd975fff7f | 2,948 | 3 | [
"skins_site/_site_body_header.inc.php"
] | PHP | {"skins_site/_site_body_header.inc.php": {"lines_added": 2, "lines_deleted": 2}} | diff --git a/skins_site/_site_body_header.inc.php b/skins_site/_site_body_header.inc.php
index 70e3c21796..99e63b9a90 100644
--- a/skins_site/_site_body_header.inc.php
+++ b/skins_site/_site_body_header.inc.php
@@ -15,12 +15,12 @@ global $baseurl, $Settings;
<nav class="sitewide_header">
<?php
if( $Settings->get( ... | $site_title = $Settings->get( 'notification_long_name' ) != '' ? ' title="'.$Settings->get( 'notification_long_name' ).'"' : '';
$site_name_text = '<img src="'.$Settings->get( 'notification_logo' ).'" alt="'.$Settings->get( 'notification_short_name' ).'"'.$site_title.' />'; | $site_title = $Settings->get( 'notification_long_name' ) != '' ? ' title="'.format_to_output( $Settings->get( 'notification_long_name' ), 'htmlattr' ).'"' : '';
$site_name_text = '<img src="'.$Settings->get( 'notification_logo' ).'" alt="'.format_to_output( $Settings->get( 'notification_short_name' ), 'htmlattr' ).'"... | [] |
End of preview. Expand in Data Studio
CVEfixes Security Vulnerabilities Dataset
Security vulnerability data from CVEfixes v1.0.8 with 12,987 vulnerability fix records across 11,726 unique CVEs and 4,205 repositories.
Contains CVE metadata (descriptions, CVSS scores, CWE classifications), git commit data, and code diffs showing vulnerable vs fixed code.
Usage
from datasets import load_dataset
dataset = load_dataset("hitoshura25/cvefixes")
Citation
If you use this dataset, please cite the original CVEfixes paper:
@inproceedings{bhandari2021cvefixes,
title={CVEfixes: Automated Collection of Vulnerabilities and Their Fixes from Open-Source Software},
author={Bhandari, Guru and Naseer, Amara and Moonen, Leon},
booktitle={Proceedings of the 17th International Conference on Predictive Models and Data Analytics in Software Engineering},
pages={30--39},
year={2021}
}
License
Apache License 2.0 - Derived from CVEfixes
- Downloads last month
- 607