Dataset Viewer
Auto-converted to Parquet Duplicate
cve_id
stringclasses
822 values
cve_published
timestamp[ns]
cve_descriptions
stringclasses
818 values
cve_metrics
dict
cve_references
listlengths
1
34
cve_configurations
listlengths
1
5
url
stringclasses
844 values
cve_tags
sequencelengths
1
4
domain
stringclasses
1 value
issue_owner_repo
sequencelengths
2
2
issue_body
stringlengths
0
8.04k
issue_title
stringlengths
1
346
issue_comments_url
stringlengths
59
81
issue_comments_count
int64
0
146
issue_created_at
timestamp[ns]
issue_updated_at
stringlengths
20
20
issue_html_url
stringlengths
40
62
issue_github_id
int64
128M
2.4B
issue_number
int64
21
125k
label
bool
2 classes
issue_msg
stringlengths
120
8.18k
issue_msg_n_tokens
int64
120
8.18k
issue_embedding
sequencelengths
3.07k
3.07k
CVE-2020-25663
2020-12-08T21:15:12.420000
A call to ConformPixelInfo() in the SetImageAlphaChannel() routine of /MagickCore/channel.c caused a subsequent heap-use-after-free or heap-buffer-overflow READ when GetPixelRed() or GetPixelBlue() was called. This could occur if an attacker is able to submit a malicious image file to be processed by ImageMagick and co...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891601" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Third Party Advisory" ], "url":...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8FFBE52-1112-43E2-BC1B-D1388F18988C", "versionEndExcluding": "7.0.8-56", "versionEndIncluding": null, "versionS...
https://github.com/ImageMagick/ImageMagick/issues/1723
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
heap-use-after-free at MagickCore/pixel-accessor.h in GetPixelRed
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1723/comments
4
2019-10-06T12:41:15
2020-10-29T00:07:54Z
https://github.com/ImageMagick/ImageMagick/issues/1723
503,095,531
1,723
true
This is a GitHub Issue repo:ImageMagick owner:ImageMagick Title : heap-use-after-free at MagickCore/pixel-accessor.h in GetPixelRed Issue date: --- start body --- ### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have s...
7,538
[ -0.040803104639053345, -0.01668344810605049, -0.004887728951871395, -0.000345785403624177, 0.025615129619836807, 0.020360393449664116, -0.011065132915973663, 0.02897651679813862, -0.008204525336623192, 0.03015643171966076, -0.011943208985030651, -0.015970012173056602, 0.020236913114786148, ...
null
null
null
null
null
null
null
null
null
[ "ImageMagick", "ImageMagick" ]
### ImageMagick version 7.1.1-30 ### Operating system Linux ### Operating system, version and so on Ubuntu 20.04 LTS ### Description ``` ./rotate_fuzzer ./out_rotate_crash/default/crashes/id\:000000\,sig\:06\,src\:016175+01 3217_time\:36400038_execs\:207091_op\:splice_rep\:16 Reading 537 bytes from ./out_ro...
heap-buffer-overflow
https://api.github.com/repos/ImageMagick/ImageMagick/issues/7253/comments
1
2024-04-16T10:54:15
2024-04-18T18:55:22Z
https://github.com/ImageMagick/ImageMagick/issues/7253
2,245,742,982
7,253
false
This is a GitHub Issue repo:ImageMagick owner:ImageMagick Title : heap-buffer-overflow Issue date: --- start body --- ### ImageMagick version 7.1.1-30 ### Operating system Linux ### Operating system, version and so on Ubuntu 20.04 LTS ### Description ``` ./rotate_fuzzer ./out_rotate_crash/default/crashes/id\:...
4,859
[ -0.017205795273184776, -0.009327657520771027, -0.00037868693470954895, 0.03148356080055237, 0.03429562970995903, 0.023177815601229668, -0.027410412207245827, 0.033396925777196884, -0.03229529410600662, 0.03736861050128937, -0.0015346786240115762, -0.018524857237935066, 0.00731644919142127, ...
CVE-2019-17453
2019-10-10T17:15:17.843000
"Bento4 1.5.1.0 has a NULL pointer dereference in AP4_DescriptorListWriter::Action in Core/Ap4Descri(...TRUNCATED)
{"cvssMetricV2":[{"acInsufInfo":false,"baseSeverity":"MEDIUM","cvssData":{"accessComplexity":"MEDIUM(...TRUNCATED)
[{"source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"],"url":"https://github.com/axiom(...TRUNCATED)
[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:axiosys:bento4:1.5.1.0:*:*:*:*:*:*:*","matchCriteriaI(...TRUNCATED)
https://github.com/axiomatic-systems/Bento4/issues/436
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
"**System Details**\r\nCommit ID: bc1b02a\r\nTest Machine : Ubuntu 16.04.3 LTS\r\nMP4 Compacter - Ve(...TRUNCATED)
SEGV in mp4compact
https://api.github.com/repos/axiomatic-systems/Bento4/issues/436/comments
0
2019-09-30T07:47:11
2019-10-08T05:14:45Z
https://github.com/axiomatic-systems/Bento4/issues/436
500,109,805
436
true
"This is a GitHub Issue\nrepo:Bento4\nowner:axiomatic-systems\nTitle : SEGV in mp4compact\nIssue dat(...TRUNCATED)
2,378
[-0.011965548619627953,0.04515301063656807,-0.0026640277355909348,-0.005301716271787882,0.0329315960(...TRUNCATED)
CVE-2019-20159
2019-12-31T00:15:12.243000
"An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a memory lea(...TRUNCATED)
{"cvssMetricV2":[{"acInsufInfo":false,"baseSeverity":"MEDIUM","cvssData":{"accessComplexity":"MEDIUM(...TRUNCATED)
[{"source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"],"url":"https://github.com/gpac/(...TRUNCATED)
[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*","matchCriteriaId":"93E(...TRUNCATED)
https://github.com/gpac/gpac/issues/1321
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
"System info: \r\nUbuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (master 6ada10e) \r\nCompile Command:\r(...TRUNCATED)
AddressSanitizer: a memory leak of dinf_New()
https://api.github.com/repos/gpac/gpac/issues/1321/comments
2
2019-10-28T16:03:11
2020-01-08T12:43:28Z
https://github.com/gpac/gpac/issues/1321
513,400,465
1,321
true
"This is a GitHub Issue\nrepo:gpac\nowner:gpac\nTitle : AddressSanitizer: a memory leak of dinf_New((...TRUNCATED)
1,983
[-0.041972242295742035,0.04615168273448944,-0.013360867276787758,-0.010663499124348164,0.02014134079(...TRUNCATED)
null
null
null
null
null
null
null
null
null
[ "MonetDB", "MonetDB" ]
"**Describe the bug**\r\nThe `IS DISTINCT FROM` operator in MonetDB returns unexpected results when (...TRUNCATED)
Unexpected result when using `IS DISTINCT FROM` with `RIGHT JOIN`
https://api.github.com/repos/MonetDB/MonetDB/issues/7527/comments
1
2024-05-30T10:13:24
2024-06-27T13:20:22Z
https://github.com/MonetDB/MonetDB/issues/7527
2,325,283,524
7,527
false
"This is a GitHub Issue\nrepo:MonetDB\nowner:MonetDB\nTitle : Unexpected result when using `IS DISTI(...TRUNCATED)
1,781
[0.01669452153146267,-0.017701834440231323,-0.015351438894867897,0.049452316015958786,-0.00913967937(...TRUNCATED)
CVE-2021-44921
2021-12-21T21:15:07.630000
"A null pointer dereference vulnerability exists in gpac 1.1.0 in the gf_isom_parse_movie_boxes_inte(...TRUNCATED)
{"cvssMetricV2":[{"acInsufInfo":false,"baseSeverity":"MEDIUM","cvssData":{"accessComplexity":"MEDIUM(...TRUNCATED)
[{"source":"cve@mitre.org","tags":["Exploit","Issue Tracking","Third Party Advisory"],"url":"https:/(...TRUNCATED)
[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:gpac:gpac:1.1.0:*:*:*:*:*:*:*","matchCriteriaId":"56F(...TRUNCATED)
https://github.com/gpac/gpac/issues/1964
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
"Thanks for reporting your issue. Please make sure these boxes are checked before submitting your is(...TRUNCATED)
Null Pointer Dereference in gf_isom_parse_movie_boxes_internal()
https://api.github.com/repos/gpac/gpac/issues/1964/comments
0
2021-12-10T10:59:02
2021-12-13T13:22:06Z
https://github.com/gpac/gpac/issues/1964
1,076,718,691
1,964
true
"This is a GitHub Issue\nrepo:gpac\nowner:gpac\nTitle : Null Pointer Dereference in gf_isom_parse_mo(...TRUNCATED)
5,812
[-0.02625890076160431,0.031018778681755066,-0.0105180274695158,0.027228236198425293,0.02110839448869(...TRUNCATED)
null
null
null
null
null
null
null
null
null
[ "kubernetes", "kubernetes" ]
"### What would you like to be added?\n\nwhen apiserver cache is not ready, the List request with r(...TRUNCATED)
"when apiserver cache is not ready, the List request with resourceVersion=0 fetch data from the api(...TRUNCATED)
https://api.github.com/repos/kubernetes/kubernetes/issues/124818/comments
7
2024-05-11T09:59:41
2024-07-29T07:15:18Z
https://github.com/kubernetes/kubernetes/issues/124818
2,290,815,666
124,818
false
"This is a GitHub Issue\nrepo:kubernetes\nowner:kubernetes\nTitle : when apiserver cache is not read(...TRUNCATED)
1,704
[-0.03332585096359253,0.010824454948306084,-0.011891855858266354,0.003433236153796315,0.017035441473(...TRUNCATED)
null
null
null
null
null
null
null
null
null
[ "axiomatic-systems", "Bento4" ]
"Assuming I already have an HLS fragment generated (with .mp4 version, not .ts), how can I use `mp4e(...TRUNCATED)
Encrypt HLS segments ClearKey
https://api.github.com/repos/axiomatic-systems/Bento4/issues/892/comments
0
2023-09-11T13:34:06
2023-09-12T15:30:41Z
https://github.com/axiomatic-systems/Bento4/issues/892
1,890,531,918
892
false
"This is a GitHub Issue\nrepo:Bento4\nowner:axiomatic-systems\nTitle : Encrypt HLS segments ClearKey(...TRUNCATED)
311
[-0.017340650781989098,-0.0024890098720788956,-0.01838240958750248,-0.005080217495560646,0.000993131(...TRUNCATED)
null
null
null
null
null
null
null
null
null
[ "gpac", "gpac" ]
"## Description\r\nThere is a heap buffer overflow detected by AddressSanitizer\r\n\r\n## System inf(...TRUNCATED)
There is a heap buffer overflow detected by AddressSanitizer
https://api.github.com/repos/gpac/gpac/issues/2100/comments
0
2022-02-08T04:09:59
2022-02-08T15:23:18Z
https://github.com/gpac/gpac/issues/2100
1,126,769,626
2,100
false
"This is a GitHub Issue\nrepo:gpac\nowner:gpac\nTitle : There is a heap buffer overflow detected by (...TRUNCATED)
3,961
[-0.043730221688747406,0.020210150629281998,-0.012580502778291702,0.01618495024740696,0.032790653407(...TRUNCATED)
null
null
null
null
null
null
null
null
null
[ "dromara", "hutool" ]
"现在LocalDateTimeUtil.endOfDay只能接收LocalDateTime\r\n\r\n希望可以重载一个接收Loca(...TRUNCATED)
需求请求:LocalDateTimeUtil.endOfDay重载一个接收LocalDate的方法
https://api.github.com/repos/dromara/hutool/issues/3594/comments
3
2024-05-23T07:33:39
2024-05-23T08:54:01Z
https://github.com/dromara/hutool/issues/3594
2,312,174,076
3,594
false
"This is a GitHub Issue\nrepo:hutool\nowner:dromara\nTitle : 需求请求:LocalDateTimeUtil.endOfD(...TRUNCATED)
228
[-0.01445379015058279,-0.017438963055610657,-0.0033548481296747923,0.028088392689824104,0.0195632949(...TRUNCATED)
End of preview. Expand in Data Studio

Dataset Description

Following data collection and processing, we have created the first dataset comprising a total of 4,379 GitHub issues. Of these, 844 are linked to disclosed CVE vulnerabilities, while 3,535 represent issues unrelated to any vulnerabilities. These issues are taken from 31 different repositories. For each issue linked to a vulnerability, we include CVE ID, disclosure date, vulnerability description, a list of references, details on the affected software, and vulnerability impact metrics updated until August 11th, 2024.

Fields

  1. cve_id: The unique CVE identifier.
  2. cve_published: The timestamp when the CVE was published.
  3. cve_descriptions: Textual descriptions of the CVE.
  4. cve_metrics: Container of CVSS metric information.
  5. cve_references: List of external reference links.
  6. cve_configurations: Details about affected configurations.
  7. url: The primary link to the source or CVE entry.
  8. cve_tags: Tags categorizing the CVE.
  9. domain: Domain of the refenrece link.
  10. issue_owner_repo: Repository owner and name from GitHub.
  11. issue_body: Body text of the GitHub issue.
  12. issue_title: Title of the GitHub issue.
  13. issue_comments_url: API URL for issue comments.
  14. issue_comments_count: Number of comments on the issue.
  15. issue_created_at: Timestamp of issue creation.
  16. issue_updated_at: Timestamp of the last issue update.
  17. issue_html_url: Web link to view the issue on GitHub.
  18. issue_github_id: GitHub's unique ID for the issue.
  19. issue_number: Issue number in the repository.
  20. label: Boolean label (true/false) for classification.
  21. issue_msg: Prompt used for the generation of the embedding.
  22. issue_msg_n_tokens: Number of tokens in the prompt.
  23. issue_embedding: Embedding of the prompt generated with text-embedding-3-large.
Downloads last month
14

Collection including DanCip/github-issues-vulnerability-detection

Paper for DanCip/github-issues-vulnerability-detection