Dataset Viewer
Auto-converted to Parquet Duplicate
cve_id
stringlengths
13
16
cve_published
stringlengths
23
23
cve_descriptions
stringlengths
54
1.07k
cve_metrics
dict
cve_references
listlengths
1
71
cve_configurations
listlengths
1
10
cve_tags
sequencelengths
1
4
issue_owner_repo
sequencelengths
2
2
type
stringclasses
1 value
issue_body
stringlengths
3
88.6k
issue_title
stringlengths
3
335
issue_comments_url
stringlengths
57
81
issue_comments_count
int64
0
146
issue_created_at
stringlengths
20
20
issue_updated_at
stringlengths
20
20
issue_html_url
stringlengths
38
62
issue_github_id
int64
128M
2.29B
issue_number
int64
3
125k
issue_embedding
sequencelengths
3.07k
3.07k
__index_level_0__
int64
0
1.14k
msg
stringlengths
175
88.8k
n_tokens
int64
175
88.8k
CVE-2018-20659
2019-01-02T17:29:00.220
An issue was discovered in Bento4 1.5.1-627. The AP4_StcoAtom class in Core/Ap4StcoAtom.cpp has an attempted excessive memory allocation when called from AP4_AtomFactory::CreateAtomFromStream in Core/Ap4AtomFactory.cpp, as demonstrated by mp42hls.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/350" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1-627:*:*:*:*:*:*:*", "matchCriteriaId": "F87642DF-B939-4195-A2AE-F0F1D39CD16D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "Exploit", "Third Party Advisory" ]
[ "axiomatic-systems", "Bento4" ]
Issue
A crafted input will lead to Memory allocation failed in Ap4StcoAtom.cpp at Bento4 1.5.1-627 Triggered by ./mp42hls crash7.mp4 Poc [crash7.mp4.zip](https://github.com/axiomatic-systems/Bento4/files/2718552/crash7.mp4.zip) Bento4 Version 1.5.1-627 The ASAN information is as follows: ``` ==10432==ERROR: Add...
Allocate for large amounts of memory failed in Ap4StcoAtom.cpp:81 at Bento4 1.5.1-627 when running mp42hls
https://api.github.com/repos/axiomatic-systems/Bento4/issues/350/comments
2
2018-12-31T15:52:26Z
2019-01-12T21:14:48Z
https://github.com/axiomatic-systems/Bento4/issues/350
394,998,583
350
[ -0.021416833624243736, 0.005525269545614719, -0.01057156827300787, 0.011272918432950974, 0.03262132778763771, -0.009972854517400265, -0.039412450045347214, 0.033972710371017456, -0.0039472319185733795, 0.032723963260650635, -0.0036628430243581533, 0.016259346157312393, 0.010725523345172405, ...
0
This is a GitHub Issue repo:Bento4 owner:axiomatic-systems Title : Allocate for large amounts of memory failed in Ap4StcoAtom.cpp:81 at Bento4 1.5.1-627 when running mp42hls Issue date: --- start body --- A crafted input will lead to Memory allocation failed in Ap4StcoAtom.cpp at Bento4 1.5.1-627 Triggered by ./mp...
17,108
CVE-2018-14718
2019-01-02T18:29:00.310
"FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code (...TRUNCATED)
{"cvssMetricV2":[{"acInsufInfo":false,"baseSeverity":"HIGH","cvssData":{"accessComplexity":"LOW","ac(...TRUNCATED)
[{"source":"cve@mitre.org","tags":["Third Party Advisory","VDB Entry"],"url":"http://www.securityfoc(...TRUNCATED)
[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*","matchCri(...TRUNCATED)
[ "Patch", "Third Party Advisory" ]
[ "FasterXML", "jackson-databind" ]
Issue
"This issue covers following CVEs related to polymorphic deserialization, gadgets:\r\n\r\n* CVE-2018(...TRUNCATED)
Block more classes from polymorphic deserialization (CVE-2018-14718 - CVE-2018-14721)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2097/comments
11
2018-07-27T05:58:22Z
2019-10-16T04:34:07Z
https://github.com/FasterXML/jackson-databind/issues/2097
345,100,313
2,097
[0.0074428049847483635,-0.013423113152384758,-0.016840431839227676,0.02090935967862606,0.03310165926(...TRUNCATED)
1
"This is a GitHub Issue\nrepo:jackson-databind\nowner:FasterXML\nTitle : Block more classes from pol(...TRUNCATED)
705
CVE-2018-19360
2019-01-02T18:29:00.717
"FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by lev(...TRUNCATED)
{"cvssMetricV2":[{"acInsufInfo":false,"baseSeverity":"HIGH","cvssData":{"accessComplexity":"LOW","ac(...TRUNCATED)
[{"source":"cve@mitre.org","tags":["Third Party Advisory","VDB Entry"],"url":"http://www.securityfoc(...TRUNCATED)
[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*","matchCri(...TRUNCATED)
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
[ "FasterXML", "jackson-databind" ]
Issue
"This issue covers following CVEs related to polymorphic deserialization, gadgets:\r\n\r\nCVE-2018-1(...TRUNCATED)
"Block more classes from polymorphic deserialization (CVE-2018-19360, CVE-2018-19361, CVE-2018-19362(...TRUNCATED)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2186/comments
8
2018-11-18T23:39:02Z
2020-07-31T17:29:54Z
https://github.com/FasterXML/jackson-databind/issues/2186
382,014,049
2,186
[0.0028032574336975813,-0.009676402434706688,-0.01738128252327442,0.024644020944833755,0.02373074181(...TRUNCATED)
2
"This is a GitHub Issue\nrepo:jackson-databind\nowner:FasterXML\nTitle : Block more classes from pol(...TRUNCATED)
735
CVE-2019-6132
2019-01-11T05:29:01.763
"An issue was discovered in Bento4 v1.5.1-627. There is a memory leak in AP4_DescriptorFactory::Crea(...TRUNCATED)
{"cvssMetricV2":[{"acInsufInfo":false,"baseSeverity":"MEDIUM","cvssData":{"accessComplexity":"LOW","(...TRUNCATED)
[{"source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"],"url":"https://github.com/axiom(...TRUNCATED)
[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:axiosys:bento4:1.5.1-627:*:*:*:*:*:*:*","matchCriteri(...TRUNCATED)
[ "Exploit", "Third Party Advisory" ]
[ "axiomatic-systems", "Bento4" ]
Issue
"there is memory leaks in Ap4String.cpp\r\n\r\n./mp42aac poc /dev/null\r\n\r\n=================(...TRUNCATED)
memory leaks in Ap4String.cpp
https://api.github.com/repos/axiomatic-systems/Bento4/issues/357/comments
1
2019-01-10T17:00:31Z
2019-01-12T09:36:13Z
https://github.com/axiomatic-systems/Bento4/issues/357
397,925,621
357
[-0.005346340127289295,0.018189847469329834,-0.005688167642802,0.0014844543766230345,0.0155858099460(...TRUNCATED)
3
"This is a GitHub Issue\nrepo:Bento4\nowner:axiomatic-systems\nTitle : memory leaks in Ap4String.cpp(...TRUNCATED)
2,144
CVE-2019-6779
2019-01-24T19:29:00.197
Cscms 4.1.8 allows admin.php/links/save CSRF to add, modify, or delete friend links.
{"cvssMetricV2":[{"acInsufInfo":false,"baseSeverity":"MEDIUM","cvssData":{"accessComplexity":"MEDIUM(...TRUNCATED)
[{"source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"],"url":"https://github.com/chshc(...TRUNCATED)
[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:chshcms:cscms:4.1.8:*:*:*:*:*:*:*","matchCriteriaId":(...TRUNCATED)
[ "Exploit", "Third Party Advisory" ]
[ "chshcms", "cscms" ]
Issue
" just use add friend links for example:\r\n\r\nAfter the admin logged in, we can send him a url wit(...TRUNCATED)
There is a CSRF vulnerability that can add/modify/delete friend links
https://api.github.com/repos/chshcms/cscms/issues/3/comments
0
2019-01-24T14:51:59Z
2020-02-27T04:22:34Z
https://github.com/chshcms/cscms/issues/3
402,743,077
3
[-0.013318462297320366,-0.0017178509151563048,-0.009469583630561829,0.010683059692382812,0.012618666(...TRUNCATED)
4
"This is a GitHub Issue\nrepo:cscms\nowner:chshcms\nTitle : There is a CSRF vulnerability that can a(...TRUNCATED)
1,421
CVE-2019-6966
2019-01-25T23:29:00.237
"An issue was discovered in Bento4 1.5.1-628. The AP4_ElstAtom class in Core/Ap4ElstAtom.cpp has an (...TRUNCATED)
{"cvssMetricV2":[{"acInsufInfo":false,"baseSeverity":"MEDIUM","cvssData":{"accessComplexity":"MEDIUM(...TRUNCATED)
[{"source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"],"url":"https://github.com/axiom(...TRUNCATED)
[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:axiosys:bento4:1.5.1-628:*:*:*:*:*:*:*","matchCriteri(...TRUNCATED)
[ "Exploit", "Third Party Advisory" ]
[ "axiomatic-systems", "Bento4" ]
Issue
"A crafted input will lead to failed allocate LargeMmapAllocator in Ap4Array.h at Bento4 1.5.1-628(...TRUNCATED)
failed to allocate LargeMmapAllocator in Ap4Array.h at Bento4 v1.5.1-628 when running mp42hls
https://api.github.com/repos/axiomatic-systems/Bento4/issues/361/comments
1
2019-01-25T07:49:22Z
2019-12-26T14:50:59Z
https://github.com/axiomatic-systems/Bento4/issues/361
403,042,062
361
[-0.02854139357805252,0.005858820863068104,-0.01280048955231905,0.012950151227414608,0.0336827188730(...TRUNCATED)
5
"This is a GitHub Issue\nrepo:Bento4\nowner:axiomatic-systems\nTitle : failed to allocate LargeMmap(...TRUNCATED)
10,966
CVE-2019-7395
2019-02-05T00:29:00.400
In ImageMagick before 7.0.8-25, a memory leak exists in WritePSDChannel in coders/psd.c.
{"cvssMetricV2":[{"acInsufInfo":false,"baseSeverity":"MEDIUM","cvssData":{"accessComplexity":"LOW","(...TRUNCATED)
[{"source":"cve@mitre.org","tags":["Broken Link","Third Party Advisory"],"url":"http://lists.opensus(...TRUNCATED)
[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*","matchCriter(...TRUNCATED)
[ "Exploit", "Patch", "Third Party Advisory" ]
[ "ImageMagick", "ImageMagick" ]
Issue
"### Prerequisites\r\n\r\n- [x] I have written a descriptive issue title\r\n- [x] I have verified th(...TRUNCATED)
memory leak in WritePSDChannel in coders/psd.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1451/comments
2
2019-01-17T03:11:55Z
2019-02-12T01:45:47Z
https://github.com/ImageMagick/ImageMagick/issues/1451
400,092,278
1,451
[-0.030279599130153656,0.01799202896654606,-0.004521663300693035,0.04317546263337135,0.0178162995725(...TRUNCATED)
6
"This is a GitHub Issue\nrepo:ImageMagick\nowner:ImageMagick\nTitle : memory leak in WritePSDChannel(...TRUNCATED)
3,069
CVE-2019-7396
2019-02-05T00:29:00.447
In ImageMagick before 7.0.8-25, a memory leak exists in ReadSIXELImage in coders/sixel.c.
{"cvssMetricV2":[{"acInsufInfo":false,"baseSeverity":"MEDIUM","cvssData":{"accessComplexity":"LOW","(...TRUNCATED)
[{"source":"cve@mitre.org","tags":["Broken Link","Third Party Advisory"],"url":"http://lists.opensus(...TRUNCATED)
[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*","matchCriter(...TRUNCATED)
[ "Exploit", "Patch", "Third Party Advisory" ]
[ "ImageMagick", "ImageMagick" ]
Issue
"### Prerequisites\r\n\r\n- [x] I have written a descriptive issue title\r\n- [x] I have verified th(...TRUNCATED)
Potential Memory Leak in ReadSIXELImage in coders/sixel.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1452/comments
2
2019-01-17T04:06:51Z
2019-03-11T01:54:07Z
https://github.com/ImageMagick/ImageMagick/issues/1452
400,102,085
1,452
[-0.024491598829627037,0.024295441806316376,-0.0038425747770816088,0.018761012703180313,0.0354763865(...TRUNCATED)
7
"This is a GitHub Issue\nrepo:ImageMagick\nowner:ImageMagick\nTitle : Potential Memory Leak in ReadS(...TRUNCATED)
4,647
CVE-2019-7397
2019-02-05T00:29:00.510
"In ImageMagick before 7.0.8-25 and GraphicsMagick through 1.3.31, several memory leaks exist in Wri(...TRUNCATED)
{"cvssMetricV2":[{"acInsufInfo":false,"baseSeverity":"MEDIUM","cvssData":{"accessComplexity":"LOW","(...TRUNCATED)
[{"source":"cve@mitre.org","tags":["Patch","Third Party Advisory"],"url":"http://hg.graphicsmagick.o(...TRUNCATED)
[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*","matchCriter(...TRUNCATED)
[ "Exploit", "Patch", "Third Party Advisory" ]
[ "ImageMagick", "ImageMagick" ]
Issue
"### Prerequisites\r\n\r\n- [x] I have written a descriptive issue title\r\n- [x] I have verified th(...TRUNCATED)
Potential Memory Leak in WritePDFImage in coders/pdf.c different from #576
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1454/comments
2
2019-01-17T11:10:56Z
2019-02-12T01:46:36Z
https://github.com/ImageMagick/ImageMagick/issues/1454
400,226,040
1,454
[-0.03378884494304657,0.02055272087454796,-0.005026558879762888,0.034393761307001114,0.0209848042577(...TRUNCATED)
8
"This is a GitHub Issue\nrepo:ImageMagick\nowner:ImageMagick\nTitle : Potential Memory Leak in Write(...TRUNCATED)
3,591
CVE-2019-7398
2019-02-05T00:29:00.570
In ImageMagick before 7.0.8-25, a memory leak exists in WriteDIBImage in coders/dib.c.
{"cvssMetricV2":[{"acInsufInfo":false,"baseSeverity":"MEDIUM","cvssData":{"accessComplexity":"LOW","(...TRUNCATED)
[{"source":"cve@mitre.org","tags":["Broken Link","Third Party Advisory"],"url":"http://lists.opensus(...TRUNCATED)
[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*","matchCriter(...TRUNCATED)
[ "Exploit", "Patch", "Third Party Advisory" ]
[ "ImageMagick", "ImageMagick" ]
Issue
"### Prerequisites\r\n\r\n- [x] I have written a descriptive issue title\r\n- [x] I have verified th(...TRUNCATED)
Potential Memory Leak in WriteDIBImage in coders/dib.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1453/comments
2
2019-01-17T06:50:47Z
2019-02-12T01:46:59Z
https://github.com/ImageMagick/ImageMagick/issues/1453
400,133,504
1,453
[-0.02625642716884613,0.007168920245021582,-0.0018007726175710559,0.03119061328470707,0.027910267934(...TRUNCATED)
9
"This is a GitHub Issue\nrepo:ImageMagick\nowner:ImageMagick\nTitle : Potential Memory Leak in Write(...TRUNCATED)
4,563
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
3