Dataset Viewer
Auto-converted to Parquet Duplicate
cve_id
stringlengths
13
16
hash
stringlengths
40
40
repo_url
stringlengths
25
73
cve_description
stringlengths
64
3.9k
cvss2_base_score
float64
1.2
10
cvss3_base_score
float64
2.2
10
published_date
stringdate
1999-06-23 04:00:00
2024-07-22 18:15:00
severity
stringclasses
4 values
cwe_id
stringclasses
269 values
cwe_name
stringclasses
269 values
cwe_description
stringclasses
268 values
commit_message
stringlengths
0
46.8k
commit_date
stringlengths
25
25
version_tag
stringlengths
3
36
repo_total_files
int64
1
169k
repo_total_commits
int64
2
1.4M
file_paths
listlengths
0
53.6k
language
stringclasses
27 values
diff_stats
stringlengths
2
4.23M
diff_with_context
stringlengths
0
654M
vulnerable_code
stringlengths
0
55.3M
fixed_code
stringlengths
0
622M
security_keywords
listlengths
0
5
CVE-2024-24746
d42a0ebe6632bd0c318560e4293a522634f60594
https://github.com/apache/mynewt-nimble
[{'lang': 'en', 'value': "Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in Apache NimBLE.\xa0\n\nSpecially crafted GATT operation can cause infinite loop in GATT server leading to denial of service in Bluetooth stack or device.\n\nThis issue affects Apache NimBLE: through 1.6.0.\nUsers are recomm...
null
null
2024-04-06T12:15Z
nan
CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.
nimble/host: Fix disconnect on host connection timeout We don't need to have double loop and lock-unlock host lock when issuing disconnect. ble_gap_terminate_with_conn() can be used to disconnect and it can be called with already provided conn object under host lock.
2024-02-14 21:27:16 +0100
d42a0ebe
1,024
2
[ "nimble/host/src/ble_hs_conn.c" ]
C
{"nimble/host/src/ble_hs_conn.c": {"lines_added": 49, "lines_deleted": 62}}
diff --git a/nimble/host/src/ble_hs_conn.c b/nimble/host/src/ble_hs_conn.c index 9b7bdbb3..57ba16af 100644 --- a/nimble/host/src/ble_hs_conn.c +++ b/nimble/host/src/ble_hs_conn.c @@ -475,90 +475,77 @@ ble_hs_conn_timer(void) return BLE_HS_FOREVER; #endif struct ble_hs_conn *conn; - ble_npl_time_t now;...
ble_npl_time_t now; int32_t next_exp_in; uint16_t conn_handle; for (;;) { conn_handle = BLE_HS_CONN_HANDLE_NONE; next_exp_in = BLE_HS_FOREVER; now = ble_npl_time_get(); ble_hs_lock(); /* This loop performs one of two tasks: * 1. Determine if any connecti...
ble_npl_time_t now = ble_npl_time_get(); int32_t next_exp_in = BLE_HS_FOREVER; int32_t next_exp_in_new; bool next_exp_in_updated; ble_hs_lock(); /* This loop performs one of two tasks: * 1. Determine if any connections need to be terminated due to timeout. If * so connection is disc...
[]
CVE-2020-7763
b5d2da2639a49a95e0bdb3bc0c987cb6406b8259
https://github.com/pofider/phantom-html-to-pdf
[{'lang': 'en', 'value': 'This affects the package phantom-html-to-pdf before 0.6.1.'}]
5
7.5
2020-11-05T14:15Z
MEDIUM
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the...
fix access to files without protocol
2020-11-02 15:51:26 +0100
b5d2da2
20
2
[ "lib/scripts/conversionScriptPart.js", "test/test.js" ]
JavaScript
{"lib/scripts/conversionScriptPart.js": {"lines_added": 7, "lines_deleted": 7}, "test/test.js": {"lines_added": 33, "lines_deleted": 18}}
diff --git a/lib/scripts/conversionScriptPart.js b/lib/scripts/conversionScriptPart.js index 20c8f42..044ab07 100644 --- a/lib/scripts/conversionScriptPart.js +++ b/lib/scripts/conversionScriptPart.js @@ -17,23 +17,23 @@ if(body.cookies.length > 0) { page.onResourceRequested = function (request, networkRequest) { ...
} //potentially dangerous request if (request.url.lastIndexOf("file:///", 0) === 0 && !body.allowLocalFilesAccess) { networkRequest.abort(); return; } var should = require("should"), fs = require("fs"), }); it('should create a pdf file ignoring ssl errors', function...
} //potentially dangerous request if (request.url.lastIndexOf("http://", 0) !== 0 && request.url.lastIndexOf("https://", 0) && !body.allowLocalFilesAccess) { networkRequest.abort(); return; } var should = require("should"), fs = require("fs"), }); ...
[]
CVE-2023-51665
728496010cbfcee5b7b54001c9f79e02ede30d82
https://github.com/advplyr/audiobookshelf
[{'lang': 'en', 'value': 'Audiobookshelf is a self-hosted audiobook and podcast server. Prior to 2.7.0, Audiobookshelf is vulnerable to unauthenticated blind server-side request (SSRF) vulnerability in Auth.js. This vulnerability has been addressed in version 2.7.0. There are no known workarounds for this vulnerability...
null
7.5
2023-12-27T18:15Z
nan
CWE-918
Server-Side Request Forgery (SSRF)
The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.
Update:/auth/openid/config API endpoint to require admin user and validate issuer URL
2023-12-17 10:41:39 -0600
72849601
934
2
[ "server/Auth.js" ]
JavaScript
{"server/Auth.js": {"lines_added": 27, "lines_deleted": 6}}
diff --git a/server/Auth.js b/server/Auth.js index 0a282c9c..d2334de2 100644 --- a/server/Auth.js +++ b/server/Auth.js @@ -294,11 +294,11 @@ class Auth { // We will allow if it is in the whitelist, by saving it into this.openIdAuthSession and setting the redirect uri to /auth/openid/mobile-redirect //...
(Database.serverSettings.authOpenIDMobileRedirectURIs.length === 1 && Database.serverSettings.authOpenIDMobileRedirectURIs[0] === '*')) { * Used to auto-populate the openid URLs in config/authentication router.get('/auth/openid/config', async (req, res) => { const configUrl = `${issuerUrl...
(Database.serverSettings.authOpenIDMobileRedirectURIs.length === 1 && Database.serverSettings.authOpenIDMobileRedirectURIs[0] === '*')) { * Helper route used to auto-populate the openid URLs in config/authentication * Takes an issuer URL as a query param and requests the config data at "/.well-kn...
[ "validation", "authentication" ]
CVE-2023-51697
f2f2ea161ca0701e1405e737b0df0f96296e4f64
https://github.com/advplyr/audiobookshelf
[{'lang': 'en', 'value': 'Audiobookshelf is a self-hosted audiobook and podcast server. Prior to 2.7.0, Audiobookshelf is vulnerable to unauthenticated blind server-side request (SSRF) vulnerability in `podcastUtils.js`. This vulnerability has been addressed in version 2.7.0. There are no known workarounds for this vul...
null
7.5
2023-12-27T18:15Z
nan
CWE-918
Server-Side Request Forgery (SSRF)
The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.
Update:API endpoint /podcasts/feed validates rssFeed URL and uses SSRF req filter
2023-12-17 12:00:11 -0600
f2f2ea16
934
2
[ "server/controllers/PodcastController.js", "server/utils/index.js", "server/utils/podcastUtils.js" ]
JavaScript
{"server/controllers/PodcastController.js": {"lines_added": 12, "lines_deleted": 2}, "server/utils/index.js": {"lines_added": 22, "lines_deleted": 6}, "server/utils/podcastUtils.js": {"lines_added": 23, "lines_deleted": 5}}
diff --git a/server/controllers/PodcastController.js b/server/controllers/PodcastController.js index 035f9152..e476efd5 100644 --- a/server/controllers/PodcastController.js +++ b/server/controllers/PodcastController.js @@ -4,10 +4,11 @@ const Database = require('../Database') const fs = require('../libs/fsExtra') ...
var url = req.body.rssFeed return res.status(400).send('Bad request') Array(str1.length + 1).fill(null)); track[0][i] = i; track[j][0] = j; const indicator = str1[i - 1] === str2[j - 1] ? 0 : 1; ); return track[str2.length][str1.length]; const Logger = require('../Logger') return a...
const { validateUrl } = require('../utils/index') /** * POST: /api/podcasts/feed * * @typedef getPodcastFeedReqBody * @property {string} rssFeed * * @param {import('express').Request<{}, {}, getPodcastFeedReqBody, {}} req * @param {import('express').Response} res */ const url = validat...
[ "sanitization", "validation" ]
CVE-2024-35236
ce7f891b9b2cb57c6644aaf96f89a8bda6307664
https://github.com/advplyr/audiobookshelf
[{'lang': 'en', 'value': 'Audiobookshelf is a self-hosted audiobook and podcast server. Prior to version 2.10.0, opening an ebook with malicious scripts inside leads to code execution inside the browsing context. Attacking a user with high privileges (upload, creation of libraries) can lead to remote code execution (RC...
null
null
2024-05-27T17:15Z
nan
NVD-CWE-noinfo
Insufficient Information
There is insufficient information about the issue to classify it; details are unkown or unspecified.
Update:Disable epubs from running scripts by default, add library setting to enable it GHSA-7j99-76cj-q9pg
2024-05-26 16:01:08 -0500
ce7f891b9
934
2
[ "client/components/modals/libraries/LibrarySettings.vue", "client/components/readers/EpubReader.vue", "client/store/libraries.js", "client/strings/bg.json", "client/strings/bn.json", "client/strings/cs.json", "client/strings/da.json", "client/strings/de.json", "client/strings/en-us.json", "client/...
JSON
{"client/components/modals/libraries/LibrarySettings.vue": {"lines_added": 15, "lines_deleted": 1}, "client/components/readers/EpubReader.vue": {"lines_added": 4, "lines_deleted": 1}, "client/store/libraries.js": {"lines_added": 29, "lines_deleted": 25}, "client/strings/bg.json": {"lines_added": 2, "lines_deleted": 0},...
diff --git a/client/components/modals/libraries/LibrarySettings.vue b/client/components/modals/libraries/LibrarySettings.vue index 4183c4fe4..3808ed07b 100644 --- a/client/components/modals/libraries/LibrarySettings.vue +++ b/client/components/modals/libraries/LibrarySettings.vue @@ -58,10 +58,21 @@ <span ...
</script> allowScriptedContent: true, getCurrentLibrary: state => { return state.libraries.find(lib => lib.id === state.currentLibraryId) getSortedLibraries: state => () => { return state.libraries.map(lib => ({ ...lib })).sort((a, b) => a.displayOrder - b.displayOrder) getLibraryProvider: state =...
<div v-if="isBookLibrary" class="py-3"> <div class="flex items-center"> <ui-toggle-switch v-model="epubsAllowScriptedContent" @input="formUpdated" /> <ui-tooltip :text="$strings.LabelSettingsEpubsAllowScriptedContentHelp"> <p class="pl-4 text-base"> {{ $strings.LabelSetti...
[]
CVE-2021-4265
924d16008cfcc09356c87db01848e45290cb58ca
https://github.com/siwapp/siwapp-ror
[{'lang': 'en', 'value': 'A vulnerability was found in siwapp-ror. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to cross site scripting. The attack may be initiated remotely. The name of the patch is 924d16008cfcc09356c87db01848e45290cb58ca. It is recommended to a...
null
6.1
2022-12-21T19:15Z
nan
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Fix possible XSS issues (#365) * some fixes for old migrations, that allows new migrations * force ssl default true unless env var * check address no html tags
2021-10-19 11:07:49 +0200
924d160
334
2
[ "app/models/common.rb", "app/models/customer.rb", "config/environments/production.rb", "db/migrate/20160907152236_default_for_enabled.rb", "db/migrate/20160908093323_add_indexes_on_deleted_column.rb", "db/migrate/20160913081503_remove_status_from_commons.rb", "db/migrate/20160915000824_add_active_to_cus...
Ruby
{"app/models/common.rb": {"lines_added": 4, "lines_deleted": 0}, "app/models/customer.rb": {"lines_added": 4, "lines_deleted": 0}, "config/environments/production.rb": {"lines_added": 1, "lines_deleted": 1}, "db/migrate/20160907152236_default_for_enabled.rb": {"lines_added": 1, "lines_deleted": 1}, "db/migrate/20160908...
diff --git a/app/models/common.rb b/app/models/common.rb index 0c70c1d..388d781 100644 --- a/app/models/common.rb +++ b/app/models/common.rb @@ -29,10 +29,14 @@ class Common < ActiveRecord::Base validates :series, presence: true # from https://emailregex.com/ validates :email, format: {with: /\A([a-zA-Z0-...
# config.force_ssl = true class DefaultForEnabled < ActiveRecord::Migration class AddIndexesOnDeletedColumn < ActiveRecord::Migration class RemoveStatusFromCommons < ActiveRecord::Migration class AddActiveToCustomer < ActiveRecord::Migration class AddFailedToCommons < ActiveRecord::Migration class SeriesFirstNumber <...
validates :invoicing_address, format: { without: /<(.*)>.*?|<(.*) \/>/, message: "wrong format" } validates :shipping_address, format: { without: /<(.*)>.*?|<(.*) \/>/, message: "wrong format" } validates :invoicing_address, format: { without: /<(.*)>.*?|<(.*) \/>/, message: "Wrong address format" } ...
[ "validation" ]
CVE-2017-16876
5f06d724bc05580e7f203db2d4a4905fc1127f98
https://github.com/lepture/mistune
[{'lang': 'en', 'value': 'Cross-site scripting (XSS) vulnerability in the _keyify function in mistune.py in Mistune before 0.8.1 allows remote attackers to inject arbitrary web script or HTML by leveraging failure to escape the "key" argument.'}]
4.3
6.1
2017-12-29T15:29Z
MEDIUM
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Fix CVE-2017-16876
2017-11-21 00:15:09 +0900
5f06d72
127
3
[ "mistune.py" ]
Python
{"mistune.py": {"lines_added": 5, "lines_deleted": 3}}
diff --git a/mistune.py b/mistune.py index d6ecf7e..5b05fcb 100644 --- a/mistune.py +++ b/mistune.py @@ -9,11 +9,11 @@ """ import re import inspect -__version__ = '0.8' +__version__ = '0.8.1' __author__ = 'Hsiaoming Yang <me@lepture.com>' __all__ = [ 'BlockGrammar', 'BlockLexer', 'InlineGrammar', 'In...
__version__ = '0.8' return _key_pattern.sub(' ', key.lower()) r'<(\w+%s)((?:%s)*?)\s*>([\s\S]*?)<\/\1>' % (_valid_end, _valid_attr),
__version__ = '0.8.1' key = escape(key.lower(), quote=True) return _key_pattern.sub(' ', key) r'<(\w+%s)((?:%s)*?)\s*>([\s\S]*?)<\/\1>' % ( _valid_end, _valid_attr),
[]
CVE-2022-21159
cfa94cbf10302bedc779703f874ee2e8387a0721
https://github.com/mz-automation/libiec61850
[{'lang': 'en', 'value': 'A denial of service vulnerability exists in the parseNormalModeParameters functionality of MZ Automation GmbH libiec61850 1.5.0. A specially-crafted series of network requests can lead to denial of service. An attacker can send a sequence of malformed iec61850 messages to trigger this vulnerab...
5
7.5
2022-04-15T16:15Z
MEDIUM
CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.
- fixed - Bug in presentation layer parser can cause infinite loop (LIB61850-302)
2022-02-25 18:21:45 +0100
cfa94cb
896
3
[ "src/mms/iso_presentation/iso_presentation.c" ]
C
{"src/mms/iso_presentation/iso_presentation.c": {"lines_added": 4, "lines_deleted": 0}}
diff --git a/src/mms/iso_presentation/iso_presentation.c b/src/mms/iso_presentation/iso_presentation.c index 96fd8a3..e2ee12a 100644 --- a/src/mms/iso_presentation/iso_presentation.c +++ b/src/mms/iso_presentation/iso_presentation.c @@ -467,10 +467,14 @@ parseNormalModeParameters(IsoPresentation* self, uint8_t* buffer,...
if (bufPos < 0) return -1;
[]
CVE-2022-3976
10622ba36bb3910c151348f1569f039ecdd8786f
https://github.com/mz-automation/libiec61850
[{'lang': 'en', 'value': 'A vulnerability has been found in MZ Automation libiec61850 up to 1.4 and classified as critical. This vulnerability affects unknown code of the file src/mms/iso_mms/client/mms_client_files.c of the component MMS File Services. The manipulation of the argument filename leads to path traversal....
null
8.8
2022-11-13T14:15Z
nan
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the...
- fixed path traversal vulnerability in MMS file services (LIB61850-357)
2022-10-07 17:09:11 +0100
10622ba3
896
3
[ "hal/filesystem/linux/file_provider_linux.c", "src/mms/inc_private/mms_common_internal.h", "src/mms/iso_mms/client/mms_client_files.c", "src/mms/iso_mms/common/mms_common_msg.c", "src/mms/iso_mms/server/mms_file_service.c" ]
C
{"hal/filesystem/linux/file_provider_linux.c": {"lines_added": 0, "lines_deleted": 1}, "src/mms/inc_private/mms_common_internal.h": {"lines_added": 3, "lines_deleted": 0}, "src/mms/iso_mms/client/mms_client_files.c": {"lines_added": 30, "lines_deleted": 21}, "src/mms/iso_mms/common/mms_common_msg.c": {"lines_added": 19...
diff --git a/hal/filesystem/linux/file_provider_linux.c b/hal/filesystem/linux/file_provider_linux.c index dc869d96..7b501f00 100644 --- a/hal/filesystem/linux/file_provider_linux.c +++ b/hal/filesystem/linux/file_provider_linux.c @@ -35,11 +35,10 @@ struct sDirectoryHandle { DIR* handle; }; - FileHandle F...
MmsFileReadStateMachine* frsm = getFreeFrsm(connection); if (frsm != NULL) { MmsOutstandingCall obtainFileCall = mmsClient_getMatchingObtainFileRequest(connection, filename); if (obtainFileCall) { if (DEBUG_MMS_CLIENT) printf("MMS_CLIENT: fil...
LIB61850_INTERNAL bool mmsMsg_isFilenameSave(const char* filename); if (mmsMsg_isFilenameSave(filename) == false) { /* potential attack */ if (DEBUG_MMS_CLIENT) printf("MMS_CLIENT: client provided unsave filename -> rejected\n"); mmsMsg_createServiceErrorPdu...
[]
CVE-2023-27772
79a8eaf26070e02044afc4b2ffbfe777dfdf3e0b
https://github.com/mz-automation/libiec61850
[{'lang': 'en', 'value': 'libiec61850 v1.5.1 was discovered to contain a segmentation violation via the function ControlObjectClient_setOrigin() at /client/client_control.c.'}]
null
7.5
2023-04-13T18:15Z
nan
CWE-754
Improper Check for Unusual or Exceptional Conditions
The product does not check or incorrectly checks for unusual or exceptional conditions that are not expected to occur frequently during day to day operation of the product.
- added missing checks in iec61850_client_example_control (#442)
2023-02-24 11:07:09 +0000
79a8eaf2
896
3
[ "examples/iec61850_client_example_control/client_example_control.c" ]
C
{"examples/iec61850_client_example_control/client_example_control.c": {"lines_added": 106, "lines_deleted": 77}}
diff --git a/examples/iec61850_client_example_control/client_example_control.c b/examples/iec61850_client_example_control/client_example_control.c index 33da635a..37d6b6bc 100644 --- a/examples/iec61850_client_example_control/client_example_control.c +++ b/examples/iec61850_client_example_control/client_example_control...
if (error == IED_ERROR_OK) { MmsValue* ctlVal = MmsValue_newBoolean(true); ControlObjectClient_setOrigin(control, NULL, 3); if (ControlObjectClient_operate(control, ctlVal, 0 /* operate now */)) { printf("simpleIOGenericIO/GGIO1.SPCSO1 operated successfully\n"); } ...
if (error == IED_ERROR_OK) { MmsValue* ctlVal = NULL; MmsValue* stVal = NULL; if (control) { ctlVal = MmsValue_newBoolean(true); ControlObjectClient_setOrigin(control, NULL, 3); if (ControlObjectClient_operate(control, ctlVal, 0 /* operate now ...
[ "validation" ]
CVE-2019-25087
1a0de56e4dafff9c2f9c8f6b130a764f7a50df52
https://github.com/RamseyK/httpserver
[{'lang': 'en', 'value': "A vulnerability was found in RamseyK httpserver. It has been rated as critical. This issue affects the function ResourceHost::getResource of the file src/ResourceHost.cpp of the component URI Handler. The manipulation of the argument uri leads to path traversal: '../filedir'. The attack may be...
null
7.5
2022-12-27T09:15Z
nan
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the...
Deny any directory traversal paths. README update
2019-09-08 11:23:20 -0500
1a0de56
26
2
[ "README.md", "src/HTTPServer.cpp", "src/ResourceHost.cpp" ]
C++
{"README.md": {"lines_added": 4, "lines_deleted": 1}, "src/HTTPServer.cpp": {"lines_added": 1, "lines_deleted": 1}, "src/ResourceHost.cpp": {"lines_added": 3, "lines_deleted": 0}}
diff --git a/README.md b/README.md index ec0ba22..db89830 100755 --- a/README.md +++ b/README.md @@ -1,15 +1,18 @@ # HTTP Server Ramsey Kant https://github.com/RamseyK/httpserver -A high performance, single threaded, HTTP server written in C++ to serve as a kqueue socket management and HTTP protocol learning too...
A high performance, single threaded, HTTP server written in C++ to serve as a kqueue socket management and HTTP protocol learning tool std::cout << req->getHeaderStr(i) << std::endl;
A high performance, single threaded, HTTP server written in C++ to serve as a kqueue socket management and HTTP protocol learning tool on BSD systems ## Compiling Notes * On FreeBSD, compile with gmake std::cout << "\t" << req->getHeaderStr(i) << std::endl; if (uri.find("../") != std::string::npos) return NULL;
[]
CVE-2014-2829
586d96cc12ef218243a3466354b4d208b5472a6c
https://github.com/esl/MongooseIM
[{'lang': 'en', 'value': 'Erlang Solutions MongooseIM through 1.3.1 rev. 2 does not properly restrict the processing of compressed XML elements, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XMPP stream, aka an "xmppbomb" attack.'}]
7.8
null
2014-04-11T01:55Z
HIGH
CWE-264
Permissions, Privileges, and Access Controls
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Merge pull request #167 from esl/zlib_cwe400_fix Add zlib inflated data size limit
2014-04-09 15:05:37 +0200
586d96cc
1,451
3
[]
Unknown
{"apps/ejabberd/c_src/ejabberd_zlib_drv.c": {"lines_added": 79, "lines_deleted": 72}, "apps/ejabberd/src/ejabberd_c2s.erl": {"lines_added": 20, "lines_deleted": 18}, "apps/ejabberd/src/ejabberd_receiver.erl": {"lines_added": 10, "lines_deleted": 2}, "apps/ejabberd/src/ejabberd_socket.erl": {"lines_added": 4, "lines_del...
[]
CVE-2020-15084
7ecab5f8f0cab5297c2b863596566eb0c019cdef
https://github.com/auth0/express-jwt
[{'lang': 'en', 'value': 'In express-jwt (NPM package) up and including version 5.3.3, the algorithms entry to be specified in the configuration is not being enforced. When algorithms is not specified in the configuration, with the combination of jwks-rsa, it may lead to authorization bypass. You are affected by this v...
4.3
9.1
2020-06-30T16:15Z
MEDIUM
CWE-863
Incorrect Authorization
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.
Merge pull request from GHSA-6g6m-m6h5-w9gf Made algorithms mandatory
2020-06-29 16:36:49 -0300
7ecab5f
20
3
[]
Unknown
{"lib/index.js": {"lines_added": 3, "lines_deleted": 0}, "package.json": {"lines_added": 1, "lines_deleted": 1}, "test/jwt.test.js": {"lines_added": 46, "lines_deleted": 29}, "test/multitenancy.test.js": {"lines_added": 4, "lines_deleted": 2}, "test/revocation.test.js": {"lines_added": 2, "lines_deleted": 0}, "test/str...
[]
CVE-2016-7149
9a4ab85439d1b838ee7b8eeebbf59174bb787811
https://github.com/b2evolution/b2evolution
[{'lang': 'en', 'value': 'Cross-site scripting (XSS) vulnerability in b2evolution 6.7.5 and earlier allows remote attackers to inject arbitrary web script or HTML via vectors related to the autolink function.'}]
4.3
6.1
2017-01-18T17:59Z
MEDIUM
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Fix autolink function to avoid XSS issue
2016-08-12 18:11:18 +0300
9a4ab8543
2,948
3
[ "_tests/blogs/evocore/misc.funcs.simpletest.php", "inc/_core/_misc.funcs.php" ]
PHP
{"_tests/blogs/evocore/misc.funcs.simpletest.php": {"lines_added": 3, "lines_deleted": 0}, "inc/_core/_misc.funcs.php": {"lines_added": 4, "lines_deleted": 4}}
diff --git a/_tests/blogs/evocore/misc.funcs.simpletest.php b/_tests/blogs/evocore/misc.funcs.simpletest.php index cd2fe71cb..a58d5b943 100644 --- a/_tests/blogs/evocore/misc.funcs.simpletest.php +++ b/_tests/blogs/evocore/misc.funcs.simpletest.php @@ -52,10 +52,13 @@ class MiscFuncsTestCase extends EvoUnitTestCase ...
array( '#(^|[\s>\(]|\[url=)(https?|mailto)://([^<>{}\s]+[^.,:;!\?<>{}\s\]\)])#i', '#(^|[\s>\(]|\[url=)aim:([^,<\s\]\)]+)#i', '#(^|[\s>\(]|\[url=)www\.'.$pattern_domain.'([^<>{}\s]*[^.,:;!\?\s\]\)])#i', '#(^|[\s>\(]|\[url=)([a-z0-9\-_.]+?)@'.$pattern_domain.'([^.,:;!\?<\s\]\)]+)#i', ),
// XSS sample: 'text http://test_url.test"onmouseover="alert(1)"onerror=1 "text' => 'text <a href="http://test_url.test">http://test_url.test</a>"onmouseover="alert(1)"onerror=1 "text', array( '#(^|[\s>\(]|\[url=)(https?|mailto)://([^"<>{}\s]+[^".,:;!\?<>{}\s\]\)])#i', '#(^|[\s>\(]|\[url=)aim:([^",<\s\]\)...
[]
CVE-2016-7150
dd975fff7fce81bf12f9c59edb1a99475747c83c
https://github.com/b2evolution/b2evolution
[{'lang': 'en', 'value': 'Cross-site scripting (XSS) vulnerability in b2evolution 6.7.5 and earlier allows remote authenticated users to inject arbitrary web script or HTML via the site name.'}]
3.5
5.4
2017-01-18T17:59Z
LOW
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Fix XSS vulnerability on "site name"
2016-08-12 18:24:55 +0300
dd975fff7f
2,948
3
[ "skins_site/_site_body_header.inc.php" ]
PHP
{"skins_site/_site_body_header.inc.php": {"lines_added": 2, "lines_deleted": 2}}
diff --git a/skins_site/_site_body_header.inc.php b/skins_site/_site_body_header.inc.php index 70e3c21796..99e63b9a90 100644 --- a/skins_site/_site_body_header.inc.php +++ b/skins_site/_site_body_header.inc.php @@ -15,12 +15,12 @@ global $baseurl, $Settings; <nav class="sitewide_header"> <?php if( $Settings->get( ...
$site_title = $Settings->get( 'notification_long_name' ) != '' ? ' title="'.$Settings->get( 'notification_long_name' ).'"' : ''; $site_name_text = '<img src="'.$Settings->get( 'notification_logo' ).'" alt="'.$Settings->get( 'notification_short_name' ).'"'.$site_title.' />';
$site_title = $Settings->get( 'notification_long_name' ) != '' ? ' title="'.format_to_output( $Settings->get( 'notification_long_name' ), 'htmlattr' ).'"' : ''; $site_name_text = '<img src="'.$Settings->get( 'notification_logo' ).'" alt="'.format_to_output( $Settings->get( 'notification_short_name' ), 'htmlattr' ).'"...
[]
End of preview. Expand in Data Studio

CVEfixes Security Vulnerabilities Dataset

Security vulnerability data from CVEfixes v1.0.8 with 12,987 vulnerability fix records across 11,726 unique CVEs and 4,205 repositories.

Contains CVE metadata (descriptions, CVSS scores, CWE classifications), git commit data, and code diffs showing vulnerable vs fixed code.

Usage

from datasets import load_dataset

dataset = load_dataset("hitoshura25/cvefixes")

Citation

If you use this dataset, please cite the original CVEfixes paper:

@inproceedings{bhandari2021cvefixes,
  title={CVEfixes: Automated Collection of Vulnerabilities and Their Fixes from Open-Source Software},
  author={Bhandari, Guru and Naseer, Amara and Moonen, Leon},
  booktitle={Proceedings of the 17th International Conference on Predictive Models and Data Analytics in Software Engineering},
  pages={30--39},
  year={2021}
}

License

Apache License 2.0 - Derived from CVEfixes

Downloads last month
607