Automating Vulnerability Detection in GitHub Issues
Collection
https://arxiv.org/abs/2501.05258 • 3 items • Updated
cve_id stringclasses 822
values | cve_published timestamp[ns] | cve_descriptions stringclasses 818
values | cve_metrics dict | cve_references listlengths 1 34 ⌀ | cve_configurations listlengths 1 5 ⌀ | url stringclasses 844
values | cve_tags sequencelengths 1 4 ⌀ | domain stringclasses 1
value | issue_owner_repo sequencelengths 2 2 | issue_body stringlengths 0 8.04k ⌀ | issue_title stringlengths 1 346 | issue_comments_url stringlengths 59 81 | issue_comments_count int64 0 146 | issue_created_at timestamp[ns] | issue_updated_at stringlengths 20 20 | issue_html_url stringlengths 40 62 | issue_github_id int64 128M 2.4B | issue_number int64 21 125k | label bool 2
classes | issue_msg stringlengths 120 8.18k | issue_msg_n_tokens int64 120 8.18k | issue_embedding sequencelengths 3.07k 3.07k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2020-25663 | 2020-12-08T21:15:12.420000 | A call to ConformPixelInfo() in the SetImageAlphaChannel() routine of /MagickCore/channel.c caused a subsequent heap-use-after-free or heap-buffer-overflow READ when GetPixelRed() or GetPixelBlue() was called. This could occur if an attacker is able to submit a malicious image file to be processed by ImageMagick and co... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891601"
},
{
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url":... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A8FFBE52-1112-43E2-BC1B-D1388F18988C",
"versionEndExcluding": "7.0.8-56",
"versionEndIncluding": null,
"versionS... | https://github.com/ImageMagick/ImageMagick/issues/1723 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to... | heap-use-after-free at MagickCore/pixel-accessor.h in GetPixelRed | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1723/comments | 4 | 2019-10-06T12:41:15 | 2020-10-29T00:07:54Z | https://github.com/ImageMagick/ImageMagick/issues/1723 | 503,095,531 | 1,723 | true | This is a GitHub Issue
repo:ImageMagick
owner:ImageMagick
Title : heap-use-after-free at MagickCore/pixel-accessor.h in GetPixelRed
Issue date:
--- start body ---
### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have s... | 7,538 | [
-0.040803104639053345,
-0.01668344810605049,
-0.004887728951871395,
-0.000345785403624177,
0.025615129619836807,
0.020360393449664116,
-0.011065132915973663,
0.02897651679813862,
-0.008204525336623192,
0.03015643171966076,
-0.011943208985030651,
-0.015970012173056602,
0.020236913114786148,
... |
null | null | null | null | null | null | null | null | null | [
"ImageMagick",
"ImageMagick"
] | ### ImageMagick version
7.1.1-30
### Operating system
Linux
### Operating system, version and so on
Ubuntu 20.04 LTS
### Description
```
./rotate_fuzzer ./out_rotate_crash/default/crashes/id\:000000\,sig\:06\,src\:016175+01
3217_time\:36400038_execs\:207091_op\:splice_rep\:16
Reading 537 bytes from ./out_ro... | heap-buffer-overflow | https://api.github.com/repos/ImageMagick/ImageMagick/issues/7253/comments | 1 | 2024-04-16T10:54:15 | 2024-04-18T18:55:22Z | https://github.com/ImageMagick/ImageMagick/issues/7253 | 2,245,742,982 | 7,253 | false | This is a GitHub Issue
repo:ImageMagick
owner:ImageMagick
Title : heap-buffer-overflow
Issue date:
--- start body ---
### ImageMagick version
7.1.1-30
### Operating system
Linux
### Operating system, version and so on
Ubuntu 20.04 LTS
### Description
```
./rotate_fuzzer ./out_rotate_crash/default/crashes/id\:... | 4,859 | [
-0.017205795273184776,
-0.009327657520771027,
-0.00037868693470954895,
0.03148356080055237,
0.03429562970995903,
0.023177815601229668,
-0.027410412207245827,
0.033396925777196884,
-0.03229529410600662,
0.03736861050128937,
-0.0015346786240115762,
-0.018524857237935066,
0.00731644919142127,
... |
CVE-2019-17453 | 2019-10-10T17:15:17.843000 | "Bento4 1.5.1.0 has a NULL pointer dereference in AP4_DescriptorListWriter::Action in Core/Ap4Descri(...TRUNCATED) | {"cvssMetricV2":[{"acInsufInfo":false,"baseSeverity":"MEDIUM","cvssData":{"accessComplexity":"MEDIUM(...TRUNCATED) | [{"source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"],"url":"https://github.com/axiom(...TRUNCATED) | [{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:axiosys:bento4:1.5.1.0:*:*:*:*:*:*:*","matchCriteriaI(...TRUNCATED) | https://github.com/axiomatic-systems/Bento4/issues/436 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"axiomatic-systems",
"Bento4"
] | "**System Details**\r\nCommit ID: bc1b02a\r\nTest Machine : Ubuntu 16.04.3 LTS\r\nMP4 Compacter - Ve(...TRUNCATED) | SEGV in mp4compact | https://api.github.com/repos/axiomatic-systems/Bento4/issues/436/comments | 0 | 2019-09-30T07:47:11 | 2019-10-08T05:14:45Z | https://github.com/axiomatic-systems/Bento4/issues/436 | 500,109,805 | 436 | true | "This is a GitHub Issue\nrepo:Bento4\nowner:axiomatic-systems\nTitle : SEGV in mp4compact\nIssue dat(...TRUNCATED) | 2,378 | [-0.011965548619627953,0.04515301063656807,-0.0026640277355909348,-0.005301716271787882,0.0329315960(...TRUNCATED) |
CVE-2019-20159 | 2019-12-31T00:15:12.243000 | "An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a memory lea(...TRUNCATED) | {"cvssMetricV2":[{"acInsufInfo":false,"baseSeverity":"MEDIUM","cvssData":{"accessComplexity":"MEDIUM(...TRUNCATED) | [{"source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"],"url":"https://github.com/gpac/(...TRUNCATED) | [{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*","matchCriteriaId":"93E(...TRUNCATED) | https://github.com/gpac/gpac/issues/1321 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | "System info: \r\nUbuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (master 6ada10e) \r\nCompile Command:\r(...TRUNCATED) | AddressSanitizer: a memory leak of dinf_New() | https://api.github.com/repos/gpac/gpac/issues/1321/comments | 2 | 2019-10-28T16:03:11 | 2020-01-08T12:43:28Z | https://github.com/gpac/gpac/issues/1321 | 513,400,465 | 1,321 | true | "This is a GitHub Issue\nrepo:gpac\nowner:gpac\nTitle : AddressSanitizer: a memory leak of dinf_New((...TRUNCATED) | 1,983 | [-0.041972242295742035,0.04615168273448944,-0.013360867276787758,-0.010663499124348164,0.02014134079(...TRUNCATED) |
null | null | null | null | null | null | null | null | null | [
"MonetDB",
"MonetDB"
] | "**Describe the bug**\r\nThe `IS DISTINCT FROM` operator in MonetDB returns unexpected results when (...TRUNCATED) | Unexpected result when using `IS DISTINCT FROM` with `RIGHT JOIN` | https://api.github.com/repos/MonetDB/MonetDB/issues/7527/comments | 1 | 2024-05-30T10:13:24 | 2024-06-27T13:20:22Z | https://github.com/MonetDB/MonetDB/issues/7527 | 2,325,283,524 | 7,527 | false | "This is a GitHub Issue\nrepo:MonetDB\nowner:MonetDB\nTitle : Unexpected result when using `IS DISTI(...TRUNCATED) | 1,781 | [0.01669452153146267,-0.017701834440231323,-0.015351438894867897,0.049452316015958786,-0.00913967937(...TRUNCATED) |
CVE-2021-44921 | 2021-12-21T21:15:07.630000 | "A null pointer dereference vulnerability exists in gpac 1.1.0 in the gf_isom_parse_movie_boxes_inte(...TRUNCATED) | {"cvssMetricV2":[{"acInsufInfo":false,"baseSeverity":"MEDIUM","cvssData":{"accessComplexity":"MEDIUM(...TRUNCATED) | [{"source":"cve@mitre.org","tags":["Exploit","Issue Tracking","Third Party Advisory"],"url":"https:/(...TRUNCATED) | [{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:gpac:gpac:1.1.0:*:*:*:*:*:*:*","matchCriteriaId":"56F(...TRUNCATED) | https://github.com/gpac/gpac/issues/1964 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | "Thanks for reporting your issue. Please make sure these boxes are checked before submitting your is(...TRUNCATED) | Null Pointer Dereference in gf_isom_parse_movie_boxes_internal() | https://api.github.com/repos/gpac/gpac/issues/1964/comments | 0 | 2021-12-10T10:59:02 | 2021-12-13T13:22:06Z | https://github.com/gpac/gpac/issues/1964 | 1,076,718,691 | 1,964 | true | "This is a GitHub Issue\nrepo:gpac\nowner:gpac\nTitle : Null Pointer Dereference in gf_isom_parse_mo(...TRUNCATED) | 5,812 | [-0.02625890076160431,0.031018778681755066,-0.0105180274695158,0.027228236198425293,0.02110839448869(...TRUNCATED) |
null | null | null | null | null | null | null | null | null | [
"kubernetes",
"kubernetes"
] | "### What would you like to be added?\n\nwhen apiserver cache is not ready, the List request with r(...TRUNCATED) | "when apiserver cache is not ready, the List request with resourceVersion=0 fetch data from the api(...TRUNCATED) | https://api.github.com/repos/kubernetes/kubernetes/issues/124818/comments | 7 | 2024-05-11T09:59:41 | 2024-07-29T07:15:18Z | https://github.com/kubernetes/kubernetes/issues/124818 | 2,290,815,666 | 124,818 | false | "This is a GitHub Issue\nrepo:kubernetes\nowner:kubernetes\nTitle : when apiserver cache is not read(...TRUNCATED) | 1,704 | [-0.03332585096359253,0.010824454948306084,-0.011891855858266354,0.003433236153796315,0.017035441473(...TRUNCATED) |
null | null | null | null | null | null | null | null | null | [
"axiomatic-systems",
"Bento4"
] | "Assuming I already have an HLS fragment generated (with .mp4 version, not .ts), how can I use `mp4e(...TRUNCATED) | Encrypt HLS segments ClearKey | https://api.github.com/repos/axiomatic-systems/Bento4/issues/892/comments | 0 | 2023-09-11T13:34:06 | 2023-09-12T15:30:41Z | https://github.com/axiomatic-systems/Bento4/issues/892 | 1,890,531,918 | 892 | false | "This is a GitHub Issue\nrepo:Bento4\nowner:axiomatic-systems\nTitle : Encrypt HLS segments ClearKey(...TRUNCATED) | 311 | [-0.017340650781989098,-0.0024890098720788956,-0.01838240958750248,-0.005080217495560646,0.000993131(...TRUNCATED) |
null | null | null | null | null | null | null | null | null | [
"gpac",
"gpac"
] | "## Description\r\nThere is a heap buffer overflow detected by AddressSanitizer\r\n\r\n## System inf(...TRUNCATED) | There is a heap buffer overflow detected by AddressSanitizer | https://api.github.com/repos/gpac/gpac/issues/2100/comments | 0 | 2022-02-08T04:09:59 | 2022-02-08T15:23:18Z | https://github.com/gpac/gpac/issues/2100 | 1,126,769,626 | 2,100 | false | "This is a GitHub Issue\nrepo:gpac\nowner:gpac\nTitle : There is a heap buffer overflow detected by (...TRUNCATED) | 3,961 | [-0.043730221688747406,0.020210150629281998,-0.012580502778291702,0.01618495024740696,0.032790653407(...TRUNCATED) |
null | null | null | null | null | null | null | null | null | [
"dromara",
"hutool"
] | "现在LocalDateTimeUtil.endOfDay只能接收LocalDateTime\r\n\r\n希望可以重载一个接收Loca(...TRUNCATED) | 需求请求:LocalDateTimeUtil.endOfDay重载一个接收LocalDate的方法 | https://api.github.com/repos/dromara/hutool/issues/3594/comments | 3 | 2024-05-23T07:33:39 | 2024-05-23T08:54:01Z | https://github.com/dromara/hutool/issues/3594 | 2,312,174,076 | 3,594 | false | "This is a GitHub Issue\nrepo:hutool\nowner:dromara\nTitle : 需求请求:LocalDateTimeUtil.endOfD(...TRUNCATED) | 228 | [-0.01445379015058279,-0.017438963055610657,-0.0033548481296747923,0.028088392689824104,0.0195632949(...TRUNCATED) |
Following data collection and processing, we have created the first dataset comprising a total of 4,379 GitHub issues. Of these, 844 are linked to disclosed CVE vulnerabilities, while 3,535 represent issues unrelated to any vulnerabilities. These issues are taken from 31 different repositories. For each issue linked to a vulnerability, we include CVE ID, disclosure date, vulnerability description, a list of references, details on the affected software, and vulnerability impact metrics updated until August 11th, 2024.