Dataset Viewer
Auto-converted to Parquet Duplicate
prior_version
stringlengths
69
33.8k
after_version
stringlengths
27
34.8k
vuln_id
stringlengths
13
19
cwe_id
stringclasses
137 values
score
float64
0
10
chain
stringlengths
78
111
dataset
stringclasses
2 values
summary
stringlengths
44
6.88k
published_date
stringdate
2009-05-11 00:00:00
2022-08-11 00:00:00
chain_len
int64
1
1
project
stringlengths
26
59
commit_href
stringlengths
74
107
commit_sha
stringlengths
40
40
patch
stringclasses
1 value
chain_ord
stringlengths
44
44
before_first_fix_commit
stringlengths
44
88
last_fix_commit
stringlengths
40
40
chain_ord_pos
int64
1
1
commit_datetime
stringlengths
20
20
message
stringlengths
2
8.66k
author
stringlengths
2
44
comments
stringclasses
155 values
stats
stringclasses
474 values
files
listlengths
1
1
file_extension
stringclasses
14 values
cwe
stringclasses
25 values
file_paths
listlengths
1
1
file_paths_str
stringlengths
4
162
num_files
int64
1
1
interface IPayload extends Partial<IMessage> { } /* eslint-enable camelcase */ /** * @private * @constructor interface IPayload extends Partial<IMessage> { * * @property {object} sharedWithDevices * devices with which we have shared the session key * userId -> {deviceId -> msgindex} */ class Outbound...
interface IPayload extends Partial<IMessage> { } /* eslint-enable camelcase */ interface SharedWithData { // The identity key of the device we shared with deviceKey: string; // The message index of the ratchet we shared with that device messageIndex: number; } /** * @private * @constructor interfac...
GHSA-23cm-x6j7-6hq3
{'CWE-200'}
5.9
{'https://github.com/matrix-org/matrix-js-sdk/commit/894c24880da0e1cc81818f51c0db80e3c9fb2be9'}
osv
matrix-js-sdk can be tricked into disclosing E2EE room keys to a participating homeserver ### Impact A logic error in the room key sharing functionality of matrix-js-sdk before 12.4.1 allows a malicious Matrix homeserver† participating in an encrypted room to steal room encryption keys from affected Matrix clients par...
2021-09-14
1
https://github.com/matrix-org/matrix-js-sdk
https://github.com/matrix-org/matrix-js-sdk/commit/894c24880da0e1cc81818f51c0db80e3c9fb2be9
894c24880da0e1cc81818f51c0db80e3c9fb2be9
SINGLE
['894c24880da0e1cc81818f51c0db80e3c9fb2be9']
{'f8186add92dd5f0ca2f6a1cda10bc0ece3730f86'}
894c24880da0e1cc81818f51c0db80e3c9fb2be9
1
09/13/2021, 11:34:48
Verify target device key on reshare
RiotRobot
null
{'additions': 29, 'deletions': 9, 'total': 38}
[ { "additions": 29, "changes": 38, "deletions": 9, "patch": "@@ -101,6 +101,13 @@ interface IPayload extends Partial<IMessage> {\n }\n /* eslint-enable camelcase */\n \n+interface SharedWithData {\n+ // The identity key of the device we shared with\n+ deviceKey: string;\n+ // The message ind...
ts
CWE-200
[ "src/crypto/algorithms/megolm.ts" ]
src/crypto/algorithms/megolm.ts
1
const formatError = error => [ { messages: [{ id: error.id, message: error.message, field: error.field }] }, ]; /** * A set of functions called "actions" for `Admin` */ module.exports = { try { const { plugin } = ctx.request.body; if (!/^[A-Za-z0-9_-]+$/.test(plugin)) { return ctx.badRequ...
const formatError = error => [ { messages: [{ id: error.id, message: error.message, field: error.field }] }, ]; const PLUGIN_NAME_REGEX = /^[A-Za-z][A-Za-z0-9-_]+$/; /** * Validates a plugin name format */ const isValidPluginName = plugin => { return ( _.isString(plugin) && !_.isEmpty(plugin) && PLUGIN_NAM...
GHSA-23fp-fmrv-f5px
{'CWE-400'}
4.9
{'https://github.com/strapi/strapi/commit/c0c191c08f05fe10d7a6b1bf9475c1a651a89362'}
osv
Uncontrolled Resource Consumption in strapi A denial of service exists in strapi v3.0.0-beta.18.3 and earlier that can be abused in the admin console using admin rights can lead to arbitrary restart of the application.
2021-12-10
1
https://github.com/strapi/strapi
https://github.com/strapi/strapi/commit/c0c191c08f05fe10d7a6b1bf9475c1a651a89362
c0c191c08f05fe10d7a6b1bf9475c1a651a89362
SINGLE
['c0c191c08f05fe10d7a6b1bf9475c1a651a89362']
{'7e3f7ee2de9eecd0bc098d7b77940b64f48b3a96'}
c0c191c08f05fe10d7a6b1bf9475c1a651a89362
1
01/07/2020, 13:15:16
chore(admin): Improve plugin name validator in install/uninstall plugin
Alexandre Bodin
null
{'additions': 13, 'deletions': 2, 'total': 15}
[ { "additions": 13, "changes": 15, "deletions": 2, "patch": "@@ -7,6 +7,17 @@ const formatError = error => [\n { messages: [{ id: error.id, message: error.message, field: error.field }] },\n ];\n \n+const PLUGIN_NAME_REGEX = /^[A-Za-z][A-Za-z0-9-_]+$/;\n+\n+/**\n+ * Validates a plugin name format\n...
js
CWE-400
[ "packages/strapi-admin/controllers/Admin.js" ]
packages/strapi-admin/controllers/Admin.js
1
class DequantizeOp : public OpKernel { const Tensor& input_min_tensor = ctx->input(1); const Tensor& input_max_tensor = ctx->input(2); int num_slices = 1; if (axis_ > -1) { num_slices = input.dim_size(axis_);
class DequantizeOp : public OpKernel { const Tensor& input_min_tensor = ctx->input(1); const Tensor& input_max_tensor = ctx->input(2); OP_REQUIRES( ctx, axis_ < input.dims(), errors::InvalidArgument("Axis must be less than input dimension(", input.dims(), ")...
GHSA-23hm-7w47-xw72
{'CWE-125'}
8.1
{'https://github.com/tensorflow/tensorflow/commit/23968a8bf65b009120c43b5ebcceaf52dbc9e943'}
osv
Out of bounds read in Tensorflow ### Impact The [implementation of `Dequantize`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/dequantize_op.cc#L92-L153) does not fully validate the value of `axis` and can result in heap OOB accesses: ```python import t...
2022-02-09
1
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/23968a8bf65b009120c43b5ebcceaf52dbc9e943
23968a8bf65b009120c43b5ebcceaf52dbc9e943
SINGLE
['23968a8bf65b009120c43b5ebcceaf52dbc9e943']
{'566576746f47ebf42c38ebe01cca6dbb8832a9ef'}
23968a8bf65b009120c43b5ebcceaf52dbc9e943
1
11/20/2021, 07:16:11
Fix out of bound access in DequantizeOp by adding check for axis < input dimension PiperOrigin-RevId: 411214268 Change-Id: I3249d2a69ddc82f182c589a3a5bbfb71543f4b29
Isha Arkatkar
null
{'additions': 5, 'deletions': 0, 'total': 5}
[ { "additions": 5, "changes": 5, "deletions": 0, "patch": "@@ -94,6 +94,11 @@ class DequantizeOp : public OpKernel {\n const Tensor& input_min_tensor = ctx->input(1);\n const Tensor& input_max_tensor = ctx->input(2);\n \n+ OP_REQUIRES(\n+ ctx, axis_ < input.dims(),\n+ errors:...
cc
CWE-125
[ "tensorflow/core/kernels/dequantize_op.cc" ]
tensorflow/core/kernels/dequantize_op.cc
1
limitations under the License. #include "tensorflow/core/framework/attr_value.pb.h" #include "tensorflow/core/framework/function.pb.h" #include "tensorflow/core/framework/node_def.pb.h" #include "tensorflow/core/framework/tensor.pb.h" #include "tensorflow/core/lib/io/path.h" #include "tensorflow/core/lib/monitoring/co...
limitations under the License. #include "tensorflow/core/framework/attr_value.pb.h" #include "tensorflow/core/framework/function.pb.h" #include "tensorflow/core/framework/node_def.pb.h" #include "tensorflow/core/framework/op_def.pb.h" #include "tensorflow/core/framework/tensor.pb.h" #include "tensorflow/core/lib/io/pa...
GHSA-247x-2f9f-5wp7
{'CWE-400'}
7.5
{'https://github.com/tensorflow/tensorflow/commit/448a16182065bd08a202d9057dd8ca541e67996c'}
osv
Stack overflow in TensorFlow ### Impact The `GraphDef` format in TensorFlow does not allow self recursive functions. The runtime assumes that this invariant is satisfied. However, a `GraphDef` containing a fragment such as the following can be consumed when loading a `SavedModel`: ``` library { function { ...
2022-02-09
1
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/448a16182065bd08a202d9057dd8ca541e67996c
448a16182065bd08a202d9057dd8ca541e67996c
SINGLE
['448a16182065bd08a202d9057dd8ca541e67996c']
{'7b1eba4193a389c7e92e01e585aeb71be97529cd'}
448a16182065bd08a202d9057dd8ca541e67996c
1
12/08/2021, 00:49:32
Prevent stack overflow when FunctionLib in GraphDef has a self-recursive function. It is likely that no recursivity is supported, but we should handle this separately. PiperOrigin-RevId: 414860329 Change-Id: I02a2270e86282b37362ddd485eeef16fb986a9e0
Mihai Maruseac
null
{'additions': 18, 'deletions': 0, 'total': 18}
[ { "additions": 18, "changes": 18, "deletions": 0, "patch": "@@ -25,6 +25,7 @@ limitations under the License.\n #include \"tensorflow/core/framework/attr_value.pb.h\"\n #include \"tensorflow/core/framework/function.pb.h\"\n #include \"tensorflow/core/framework/node_def.pb.h\"\n+#include \"tensorflow/...
cc
CWE-400
[ "tensorflow/cc/saved_model/loader.cc" ]
tensorflow/cc/saved_model/loader.cc
1
function ($val) { throw new Error\NotFound('The URL wasn\'t found in the module.'); } if (substr($path, -4) === '.php') { // PHP file - attempt to run it /* In some environments, $_SERVER['SCRIPT_NAME'] is already set with $_SERVER['PATH_INFO']. Check for that
function ($val) { throw new Error\NotFound('The URL wasn\'t found in the module.'); } if (mb_strtolower(substr($path, -4), 'UTF-8') === '.php') { // PHP file - attempt to run it /* In some environments, $_SERVER['SCRIPT_NAME'] is already set with $_SERVER['PATH_INF...
GHSA-24m3-w8g9-jwpq
{'CWE-178', 'CWE-200'}
3
{'https://github.com/simplesamlphp/simplesamlphp/commit/47968d26a2fd3ed52da70dc09210921d612ce44e'}
osv
Information disclosure of source code in SimpleSAMLphp ### Background The module controller in `SimpleSAML\Module` that processes requests for pages hosted by modules, has code to identify paths ending with `.php` and process those as PHP code. If no other suitable way of handling the given path exists it presents the...
2020-04-22
1
https://github.com/simplesamlphp/simplesamlphp
https://github.com/simplesamlphp/simplesamlphp/commit/47968d26a2fd3ed52da70dc09210921d612ce44e
47968d26a2fd3ed52da70dc09210921d612ce44e
SINGLE
['47968d26a2fd3ed52da70dc09210921d612ce44e']
{'228e4f2287fd5d73727178b87de7a9652bf1c5b0'}
47968d26a2fd3ed52da70dc09210921d612ce44e
1
04/16/2020, 12:17:24
Fix source code disclosure on case-insensitive file systems If the file system containing the PHP code is case-insensitive, a request containing an uppercase file extension will return the contents of the PHP file to the browser instead of executing it. E.g. a request for this URL will return the source code: http...
Olav Morken
null
{'additions': 1, 'deletions': 1, 'total': 2}
[ { "additions": 1, "changes": 2, "deletions": 1, "patch": "@@ -259,7 +259,7 @@ function ($val) {\n throw new Error\\NotFound('The URL wasn\\'t found in the module.');\n }\n \n- if (substr($path, -4) === '.php') {\n+ if (mb_strtolower(substr($path, -4), 'UTF-8') === '...
php
CWE-200
[ "lib/SimpleSAML/Module.php" ]
lib/SimpleSAML/Module.php
1
class DecodeImageV2Op : public OpKernel { if (width != static_cast<int64_t>(decode.width) || width <= 0 || width >= (1LL << 27) || height != static_cast<int64_t>(decode.height) || height <= 0 || height >= (1LL << 27) || total_size >= (1LL << 29)) { png::CommonFreeDecode(&decode); OP_REQ...
class DecodeImageV2Op : public OpKernel { if (width != static_cast<int64_t>(decode.width) || width <= 0 || width >= (1LL << 27) || height != static_cast<int64_t>(decode.height) || height <= 0 || height >= (1LL << 27) || total_size >= (1LL << 29)) { OP_REQUIRES(context, false, ...
GHSA-24x4-6qmh-88qg
{'CWE-416'}
7.6
{'https://github.com/tensorflow/tensorflow/commit/e746adbfcfee15e9cfdb391ff746c765b99bdf9b'}
osv
Use after free in `DecodePng` kernel ### Impact A malicious user can cause a use after free behavior when [decoding PNG images](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/image/decode_image_op.cc#L339-L346): ```cc if (/* ... error conditions ... */) { ...
2022-02-09
1
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/e746adbfcfee15e9cfdb391ff746c765b99bdf9b
e746adbfcfee15e9cfdb391ff746c765b99bdf9b
SINGLE
['e746adbfcfee15e9cfdb391ff746c765b99bdf9b']
{'3098fd96f45207b030c48ac78922d6221a4c421a'}
e746adbfcfee15e9cfdb391ff746c765b99bdf9b
1
11/12/2021, 03:12:19
Prevent use after free in `DecodePng` kernel. We are cleaning up the memory in `decode` and then we are using an `OP_REQUIRES` to check an invariant on the `decode` data. PiperOrigin-RevId: 409299145 Change-Id: I4eb93aaca52483eb202e89b78df07fbb2f6cb254
Mihai Maruseac
null
{'additions': 0, 'deletions': 1, 'total': 1}
[ { "additions": 0, "changes": 1, "deletions": 1, "patch": "@@ -339,7 +339,6 @@ class DecodeImageV2Op : public OpKernel {\n if (width != static_cast<int64_t>(decode.width) || width <= 0 ||\n width >= (1LL << 27) || height != static_cast<int64_t>(decode.height) ||\n height <= 0 || h...
cc
CWE-416
[ "tensorflow/core/kernels/image/decode_image_op.cc" ]
tensorflow/core/kernels/image/decode_image_op.cc
1
template <KernelType kernel_type, typename OpType> TfLiteStatus Eval(TfLiteContext* context, TfLiteNode* node) { OpContext op_context(context, node); switch (op_context.output->type) { case kTfLiteFloat32: TFLiteOperation<kernel_type, float, OpType>(context, node, op_context); break; ...
template <KernelType kernel_type, typename OpType> TfLiteStatus Eval(TfLiteContext* context, TfLiteNode* node) { OpContext op_context(context, node); // If inputs have no element, shortcircuit. if (NumElements(op_context.input1) == 0 || NumElements(op_context.input2) == 0) { return kTfLiteOk; } s...
GHSA-24x6-8c7m-hv3f
{'CWE-125'}
2.5
{'https://github.com/tensorflow/tensorflow/commit/953f28dca13c92839ba389c055587cfe6c723578'}
osv
Heap OOB read in TFLite's implementation of `Minimum` or `Maximum` ### Impact The implementations of the `Minimum` and `Maximum` TFLite operators can be used to read data outside of bounds of heap allocated objects, if any of the two input tensor arguments are empty. This is because [the broadcasting implementation](h...
2021-05-21
1
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/953f28dca13c92839ba389c055587cfe6c723578
953f28dca13c92839ba389c055587cfe6c723578
SINGLE
['953f28dca13c92839ba389c055587cfe6c723578']
{'801c1c6be5324219689c98e1bd3e0ca365ee834d'}
953f28dca13c92839ba389c055587cfe6c723578
1
04/28/2021, 00:46:38
Prevent a null pointer exception in TFLite PiperOrigin-RevId: 370800206 Change-Id: Idd437ebce4ff224120d8eefc1c14c062173b71d6
Mihai Maruseac
null
{'additions': 31, 'deletions': 29, 'total': 60}
[ { "additions": 31, "changes": 60, "deletions": 29, "patch": "@@ -157,35 +157,37 @@ template <KernelType kernel_type, typename OpType>\n TfLiteStatus Eval(TfLiteContext* context, TfLiteNode* node) {\n OpContext op_context(context, node);\n \n- switch (op_context.output->type) {\n- case kTfL...
cc
CWE-125
[ "tensorflow/lite/kernels/maximum_minimum.cc" ]
tensorflow/lite/kernels/maximum_minimum.cc
1
var QueryGenerator = { path[path.length - 1] = $tmp[0]; } $baseKey = self.quoteIdentifier(key)+'#>>\'{'+path.join(', ')+'}\''; if (options.prefix) { if (options.prefix instanceof Utils.literal) {
var QueryGenerator = { path[path.length - 1] = $tmp[0]; } var pathKey = self.escape('{' + path.join(', ') + '}'); $baseKey = self.quoteIdentifier(key)+'#>>'+pathKey; if (options.prefix) { if (options.prefix instanceof Utils.literal) {
GHSA-2598-2f59-rmhq
{'CWE-89'}
9.8
{'https://github.com/sequelize/sequelize/commit/ee4017379db0059566ecb5424274ad4e2d66bc68'}
osv
SQL Injection in sequelize Versions of `sequelize` prior to 3.35.1 are vulnerable to SQL Injection. The package fails to sanitize JSON path keys in the Postgres dialect, which may allow attackers to inject SQL statements and execute arbitrary SQL queries. ## Recommendation Upgrade to version 3.35.1 or later.
2019-11-08
1
https://github.com/sequelize/sequelize
https://github.com/sequelize/sequelize/commit/ee4017379db0059566ecb5424274ad4e2d66bc68
ee4017379db0059566ecb5424274ad4e2d66bc68
SINGLE
['ee4017379db0059566ecb5424274ad4e2d66bc68']
{'75c1fdbc676d73a28a5e0bca49b2a6d4a9f8708c'}
ee4017379db0059566ecb5424274ad4e2d66bc68
1
06/20/2019, 05:26:22
fix(postgres): json path key quoting (#11088)
Sushant
null
{'additions': 2, 'deletions': 1, 'total': 3}
[ { "additions": 2, "changes": 3, "deletions": 1, "patch": "@@ -2198,7 +2198,8 @@ var QueryGenerator = {\n path[path.length - 1] = $tmp[0];\n }\n \n- $baseKey = self.quoteIdentifier(key)+'#>>\\'{'+path.join(', ')+'}\\'';\n+ var pathKey = self.escape('{' + path.j...
js
CWE-89
[ "lib/dialects/abstract/query-generator.js" ]
lib/dialects/abstract/query-generator.js
1
class MapStageOp : public OpKernel { OP_REQUIRES_OK(ctx, ctx->input("key", &key_tensor)); OP_REQUIRES_OK(ctx, ctx->input("indices", &indices_tensor)); OP_REQUIRES_OK(ctx, ctx->input_list("values", &values_tensor)); // Create copy for insertion into Staging Area Tensor key(*key_tensor);
class MapStageOp : public OpKernel { OP_REQUIRES_OK(ctx, ctx->input("key", &key_tensor)); OP_REQUIRES_OK(ctx, ctx->input("indices", &indices_tensor)); OP_REQUIRES_OK(ctx, ctx->input_list("values", &values_tensor)); OP_REQUIRES(ctx, key_tensor->NumElements() > 0, errors::InvalidArgument(...
GHSA-278g-rq84-9hmg
{'CWE-20'}
5.5
{'https://github.com/tensorflow/tensorflow/commit/d7de67733925de196ec8863a33445b73f9562d1d'}
osv
`CHECK`-fail in `MapStage` ### Impact An attacker can trigger a denial of service via a `CHECK`-fail in `tf.raw_ops.MapStage`: ```python import tensorflow as tf tf.raw_ops.MapStage( key=tf.constant([], shape=[0, 0, 0, 0], dtype=tf.int64), indices=tf.constant((0), dtype=tf.int32), values=[tf.constant((0), dtyp...
2021-08-25
1
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/d7de67733925de196ec8863a33445b73f9562d1d
d7de67733925de196ec8863a33445b73f9562d1d
SINGLE
['d7de67733925de196ec8863a33445b73f9562d1d']
{'102cacf28ad5a9e7f00b5a195d1995ead8870006'}
d7de67733925de196ec8863a33445b73f9562d1d
1
07/30/2021, 05:23:46
Prevent a CHECK-fail due to empty tensor input in `map_stage_op.cc` PiperOrigin-RevId: 387737906 Change-Id: Idc52df0c71c7ed6e2dd633b651a581932f277c8a
Mihai Maruseac
null
{'additions': 2, 'deletions': 0, 'total': 2}
[ { "additions": 2, "changes": 2, "deletions": 0, "patch": "@@ -527,6 +527,8 @@ class MapStageOp : public OpKernel {\n OP_REQUIRES_OK(ctx, ctx->input(\"key\", &key_tensor));\n OP_REQUIRES_OK(ctx, ctx->input(\"indices\", &indices_tensor));\n OP_REQUIRES_OK(ctx, ctx->input_list(\"values\", &...
cc
CWE-20
[ "tensorflow/core/kernels/map_stage_op.cc" ]
tensorflow/core/kernels/map_stage_op.cc
1
limitations under the License. // // Input: // Tensor[0]: Hash functions. Dim.size == 2, DataType: Float. // Tensor[0].Dim[0]: Num of hash functions. // Tensor[0].Dim[1]: Num of projected output bits generated by // each hash function. // In sparse case, Ten...
limitations under the License. // // Input: // Tensor[0]: Hash functions. Dim.size == 2, DataType: Float. // Tensor[0].Dim[0]: Num of hash functions. Must be at least 1. // Tensor[0].Dim[1]: Num of projected output bits generated by // each hash function. // ...
GHSA-27qf-jwm8-g7f3
{'CWE-369'}
5.5
{'https://github.com/tensorflow/tensorflow/commit/0575b640091680cfb70f4dd93e70658de43b94f9'}
osv
FPE in LSH in TFLite ### Impact An attacker can craft a TFLite model that would trigger a division by zero error in LSH [implementation](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/lsh_projection.cc#L118). ```cc int RunningSignBit(const TfLiteTensor* ...
2021-08-25
1
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/0575b640091680cfb70f4dd93e70658de43b94f9
0575b640091680cfb70f4dd93e70658de43b94f9
SINGLE
['0575b640091680cfb70f4dd93e70658de43b94f9']
{'13aec9e4558d83fedac084ad66e32daf8bbcde0f'}
0575b640091680cfb70f4dd93e70658de43b94f9
1
07/27/2021, 23:45:20
Prevent division by 0 in LSH projection. PiperOrigin-RevId: 387225857 Change-Id: Iaeb572a763618c64f503e0026f6dd9fd769bf50c
Mihai Maruseac
null
{'additions': 2, 'deletions': 1, 'total': 3}
[ { "additions": 2, "changes": 3, "deletions": 1, "patch": "@@ -28,7 +28,7 @@ limitations under the License.\n //\n // Input:\n // Tensor[0]: Hash functions. Dim.size == 2, DataType: Float.\n-// Tensor[0].Dim[0]: Num of hash functions.\n+// Tensor[0].Dim[0]: Num of hash fun...
cc
CWE-369
[ "tensorflow/lite/kernels/lsh_projection.cc" ]
tensorflow/lite/kernels/lsh_projection.cc
1
import { platform } from "os"; import { exec } from "child_process"; export interface PingResult { packetsTransmitted: number; export interface PingResult { mdev: number; } export function ping( host: string, callback: (err: Error, res?: PingResult, stdout?: string) => void ): void { let cmd: string, pars...
import { platform } from "os"; import { exec } from "child_process"; import { domainToASCII } from "url"; export interface PingResult { packetsTransmitted: number; export interface PingResult { mdev: number; } function isValidHost(host: string): boolean { // Valid chars in IPv4, IPv6, domain names if (/^[a-...
GHSA-2877-693q-pj33
{'CWE-78'}
9.8
{'https://github.com/genieacs/genieacs/commit/7f295beeecc1c1f14308a93c82413bb334045af6'}
osv
OS Command Injection in GenieACS In GenieACS 1.2.x before 1.2.8, the UI interface API is vulnerable to unauthenticated OS command injection via the ping host argument (lib/ui/api.ts and lib/ping.ts). The vulnerability arises from insufficient input validation combined with a missing authorization check.
2022-03-07
1
https://github.com/genieacs/genieacs
https://github.com/genieacs/genieacs/commit/7f295beeecc1c1f14308a93c82413bb334045af6
7f295beeecc1c1f14308a93c82413bb334045af6
SINGLE
['7f295beeecc1c1f14308a93c82413bb334045af6']
{'2ac536bf8f2dd03c24b2eff35b69578b4efae94e'}
7f295beeecc1c1f14308a93c82413bb334045af6
1
10/14/2021, 07:33:35
Validate host arg passed to ping Fixes remote code execution vulnerability reported by Alex Hordijk.
Zaid Abdulla
null
{'additions': 13, 'deletions': 0, 'total': 13}
[ { "additions": 13, "changes": 13, "deletions": 0, "patch": "@@ -19,6 +19,7 @@\n \n import { platform } from \"os\";\n import { exec } from \"child_process\";\n+import { domainToASCII } from \"url\";\n \n export interface PingResult {\n packetsTransmitted: number;\n@@ -30,11 +31,23 @@ export interf...
ts
CWE-78
[ "lib/ping.ts" ]
lib/ping.ts
1
var reRegExpChar = /[\\^$.*+?()[\]{}|]/g, reHasRegExpChar = RegExp(reRegExpChar.source); /** Used to match leading and trailing whitespace. */ var reTrim = /^\s+|\s+$/g, reTrimStart = /^\s+/, reTrimEnd = /\s+$/; /** Used to match wrap detail comments. */ var reWrapComment = /\{(?:\n\/\* \...
var reRegExpChar = /[\\^$.*+?()[\]{}|]/g, reHasRegExpChar = RegExp(reRegExpChar.source); /** Used to match leading whitespace. */ var reTrimStart = /^\s+/; /** Used to match a single whitespace character. */ var reWhitespace = /\s/; /** Used to match wrap detail comments. */ var reWrapComment = ...
GHSA-29mw-wpgm-hmr9
{'CWE-400'}
5.3
{'https://github.com/lodash/lodash/pull/5065/commits/02906b8191d3c100c193fe6f7b27d1c40f200bb7'}
osv
Regular Expression Denial of Service (ReDoS) in lodash All versions of package lodash prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions. Steps to reproduce (provided by reporter Liyuan Chen): var lo = require('lodash'); function build_blank (n) ...
2022-01-06
1
https://github.com/lodash/lodash
https://github.com/lodash/lodash/pull/5065/commits/02906b8191d3c100c193fe6f7b27d1c40f200bb7
02906b8191d3c100c193fe6f7b27d1c40f200bb7
SINGLE
['02906b8191d3c100c193fe6f7b27d1c40f200bb7']
{'ded9bc66583ed0b4e3b7dc906206d40757b4a90a'}
02906b8191d3c100c193fe6f7b27d1c40f200bb7
1
01/26/2021, 22:17:05
perf: improve performance of `toNumber`, `trim` and `trimEnd` on large input strings
Michał Lipiński
null
{'additions': 36, 'deletions': 7, 'total': 43}
[ { "additions": 36, "changes": 43, "deletions": 7, "patch": "@@ -152,10 +152,11 @@\n var reRegExpChar = /[\\\\^$.*+?()[\\]{}|]/g,\n reHasRegExpChar = RegExp(reRegExpChar.source);\n \n- /** Used to match leading and trailing whitespace. */\n- var reTrim = /^\\s+|\\s+$/g,\n- reTrimStart ...
js
CWE-400
[ "lodash.js" ]
lodash.js
1
limitations under the License. #include <utility> #include <vector> #include "tensorflow/core/framework/op_kernel.h" #include "tensorflow/core/framework/register_types.h" #include "tensorflow/core/framework/op_kernel.h" #include "tensorflow/core/framework/register_types.h" #include "tensorflow/core/framework/resourc...
limitations under the License. #include <utility> #include <vector> #include "tensorflow/core/framework/op_kernel.h" #include "tensorflow/core/framework/register_types.h" #include "tensorflow/core/framework/resource_mgr.h" #include "tensorflow/core/framework/tensor.h" #include "tensorflow/core/framework/tensor_util.h...
GHSA-2cpx-427x-q2c6
{'CWE-190'}
2.5
{'https://github.com/tensorflow/tensorflow/commit/69c68ecbb24dff3fa0e46da0d16c821a2dd22d7c'}
osv
CHECK-fail in AddManySparseToTensorsMap ### Impact An attacker can trigger a denial of service via a `CHECK`-fail in `tf.raw_ops.AddManySparseToTensorsMap`: ```python import tensorflow as tf import numpy as np sparse_indices = tf.constant(530, shape=[1, 1], dtype=tf.int64) sparse_values = tf.ones([1], dtype=tf.int64...
2021-05-21
1
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/69c68ecbb24dff3fa0e46da0d16c821a2dd22d7c
69c68ecbb24dff3fa0e46da0d16c821a2dd22d7c
SINGLE
['69c68ecbb24dff3fa0e46da0d16c821a2dd22d7c']
{'6f9896890c4c703ae0a0845394086e2e1e523299'}
69c68ecbb24dff3fa0e46da0d16c821a2dd22d7c
1
04/20/2021, 19:14:41
Fix overflow CHECK issue with `tf.raw_ops.AddManySparseToTensorsMap`. PiperOrigin-RevId: 369492969 Change-Id: I1d70d6c0c92e3d7a25bc3b3aa2a0c0ac9688bf81
Amit Patankar
null
{'additions': 19, 'deletions': 7, 'total': 26}
[ { "additions": 19, "changes": 26, "deletions": 7, "patch": "@@ -21,16 +21,14 @@ limitations under the License.\n #include <utility>\n #include <vector>\n \n-#include \"tensorflow/core/framework/op_kernel.h\"\n-#include \"tensorflow/core/framework/register_types.h\"\n-\n #include \"tensorflow/core/fr...
cc
CWE-190
[ "tensorflow/core/kernels/sparse_tensors_map_ops.cc" ]
tensorflow/core/kernels/sparse_tensors_map_ops.cc
1
public function audit(Request $request) { } } return response()->json(Helper::formatStandardApiResponse('error', ['asset_tag'=> e($request->input('asset_tag'))], 'Asset with tag '.$request->input('asset_tag').' not found'));
public function audit(Request $request) { } } return response()->json(Helper::formatStandardApiResponse('error', ['asset_tag'=> e($request->input('asset_tag'))], 'Asset with tag '.e($request->input('asset_tag')).' not found'));
GHSA-2cqg-q7jm-j35c
{'CWE-79'}
3.9
{'https://github.com/snipe/snipe-it/commit/9ed1442bd124710f4178992cc4eca5236c7396b9'}
osv
snipe-it is vulnerable to Cross-site Scripting snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').
2021-11-15
1
https://github.com/snipe/snipe-it
https://github.com/snipe/snipe-it/commit/9ed1442bd124710f4178992cc4eca5236c7396b9
9ed1442bd124710f4178992cc4eca5236c7396b9
SINGLE
['9ed1442bd124710f4178992cc4eca5236c7396b9']
{'edf98cb7951a922cdef7505e1efd115f92d1afd9', '3ea209a507fbcc992e0a9152e2074709e8459b47'}
9ed1442bd124710f4178992cc4eca5236c7396b9
1
11/09/2021, 04:32:02
Merge pull request #10286 from uberbrady/fix_bulk_audit_xss Escape asset_tag attribute at controller level for bulk checkout
snipe
null
{'additions': 1, 'deletions': 1, 'total': 2}
[ { "additions": 1, "changes": 2, "deletions": 1, "patch": "@@ -910,7 +910,7 @@ public function audit(Request $request) {\n }\n }\n \n- return response()->json(Helper::formatStandardApiResponse('error', ['asset_tag'=> e($request->input('asset_tag'))], 'Asset with tag '.$requ...
php
CWE-79
[ "app/Http/Controllers/Api/AssetsController.php" ]
app/Http/Controllers/Api/AssetsController.php
1
limitations under the License. #include "tensorflow/core/framework/op_kernel.h" #include "tensorflow/core/framework/register_types.h" #include "tensorflow/core/framework/tensor_types.h" #include "tensorflow/core/framework/types.h" #include "tensorflow/core/kernels/reshape_op.h" class QuantizedReshapeOp : public Resha...
limitations under the License. #include "tensorflow/core/framework/op_kernel.h" #include "tensorflow/core/framework/register_types.h" #include "tensorflow/core/framework/tensor_shape.h" #include "tensorflow/core/framework/tensor_types.h" #include "tensorflow/core/framework/types.h" #include "tensorflow/core/kernels/r...
GHSA-2gfx-95x2-5v3x
{'CWE-787'}
2.5
{'https://github.com/tensorflow/tensorflow/commit/a324ac84e573fba362a5e53d4e74d5de6729933e'}
osv
Heap buffer overflow in `QuantizedReshape` ### Impact An attacker can cause a heap buffer overflow in `QuantizedReshape` by passing in invalid thresholds for the quantization: ```python import tensorflow as tf tensor = tf.constant([], dtype=tf.qint32) shape = tf.constant([], dtype=tf.int32) input_min = tf.constant([]...
2021-05-21
1
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/a324ac84e573fba362a5e53d4e74d5de6729933e
a324ac84e573fba362a5e53d4e74d5de6729933e
SINGLE
['a324ac84e573fba362a5e53d4e74d5de6729933e']
{'2ec2ce48365486311e56b3503bb75ab9e72a813d'}
a324ac84e573fba362a5e53d4e74d5de6729933e
1
04/22/2021, 01:11:15
Validate arguments to `QuantizedReshape`. Ensure that validations from `Reshape` also terminate `QuantizedReshape` on failure. PiperOrigin-RevId: 369775421 Change-Id: If8c5342267aceea65b7cb83a4b183304886f1ce8
Mihai Maruseac
null
{'additions': 23, 'deletions': 2, 'total': 25}
[ { "additions": 23, "changes": 25, "deletions": 2, "patch": "@@ -17,6 +17,7 @@ limitations under the License.\n \n #include \"tensorflow/core/framework/op_kernel.h\"\n #include \"tensorflow/core/framework/register_types.h\"\n+#include \"tensorflow/core/framework/tensor_shape.h\"\n #include \"tensorfl...
cc
CWE-787
[ "tensorflow/core/kernels/quantized_reshape_op.cc" ]
tensorflow/core/kernels/quantized_reshape_op.cc
1
private function formatMessage($message) return [ 'severity' => $this->severityLabel($level), 'timestamp' => $displayTime, 'source' => $device ? Url::deviceLink($device) : $message['message']['source'], 'message' => $message['message']['message'] ?? '', ...
private function formatMessage($message) return [ 'severity' => $this->severityLabel($level), 'timestamp' => $displayTime, 'source' => $device ? Url::deviceLink($device) : htmlspecialchars($message['message']['source']), 'message' => htmlspecialchars($messa...
GHSA-2gqg-2rg7-gh33
{'CWE-79'}
6.1
{'https://github.com/librenms/librenms/commit/cc6112b8fb36039b862b42d86eb79ef7ee89d31b'}
osv
Cross site scripting in librenms LibreNMS v22.3.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /Table/GraylogController.php.
2022-06-03
1
https://github.com/librenms/librenms
https://github.com/librenms/librenms/commit/cc6112b8fb36039b862b42d86eb79ef7ee89d31b
cc6112b8fb36039b862b42d86eb79ef7ee89d31b
SINGLE
['cc6112b8fb36039b862b42d86eb79ef7ee89d31b']
{'9c126572a2aebd43838aab9bf6abc09719ce983e'}
cc6112b8fb36039b862b42d86eb79ef7ee89d31b
1
04/19/2022, 23:10:02
fix graylog xss (#13931)
Tony Murray
null
{'additions': 2, 'deletions': 2, 'total': 4}
[ { "additions": 2, "changes": 4, "deletions": 2, "patch": "@@ -118,8 +118,8 @@ private function formatMessage($message)\n return [\n 'severity' => $this->severityLabel($level),\n 'timestamp' => $displayTime,\n- 'source' => $device ? Url::deviceLink($devi...
php
CWE-79
[ "app/Http/Controllers/Table/GraylogController.php" ]
app/Http/Controllers/Table/GraylogController.php
1
private Element parseXml(String xmlString) { Document doc = null; DocumentBuilderFactory factory = DocumentBuilderFactory.newInstance(); try { javax.xml.parsers.DocumentBuilder parser = factory .newDocumentBuilder(); parser.setErrorHandler(new ErrorHa...
private Element parseXml(String xmlString) { Document doc = null; DocumentBuilderFactory factory = DocumentBuilderFactory.newInstance(); try { factory.setFeature("http://xml.org/sax/features/external-general-entities", false); factory.setFeature("http://xml.org/sax/featu...
GHSA-2h63-qp69-fwvw
{'CWE-918', 'CWE-20'}
8.2
{'https://github.com/apache/xmlgraphics-batik/commit/0ef5b661a1f77772d1110877ea9e0287987098f6'}
osv
Server-side request forgery (SSRF) in Apache Batik Apache Batik 1.13 is vulnerable to server-side request forgery, caused by improper input validation by the NodePickerPanel. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests...
2022-01-06
1
https://github.com/apache/xmlgraphics-batik
https://github.com/apache/xmlgraphics-batik/commit/0ef5b661a1f77772d1110877ea9e0287987098f6
0ef5b661a1f77772d1110877ea9e0287987098f6
SINGLE
['0ef5b661a1f77772d1110877ea9e0287987098f6']
{'f16e092d0c2ccee07360446e0d4adaa4be5daa1b'}
0ef5b661a1f77772d1110877ea9e0287987098f6
1
06/02/2020, 13:59:37
BATIK-1284: Dont load DTDs in NodePickerPanel git-svn-id: https://svn.apache.org/repos/asf/xmlgraphics/batik/trunk@1878396 13f79535-47bb-0310-9956-ffa450edef68
Simon Steiner
null
{'additions': 4, 'deletions': 2, 'total': 6}
[ { "additions": 4, "changes": 6, "deletions": 2, "patch": "@@ -847,8 +847,10 @@ private Element parseXml(String xmlString) {\n Document doc = null;\n DocumentBuilderFactory factory = DocumentBuilderFactory.newInstance();\n try {\n- javax.xml.parsers.DocumentBuilder ...
java
CWE-20
[ "batik-svgbrowser/src/main/java/org/apache/batik/apps/svgbrowser/NodePickerPanel.java" ]
batik-svgbrowser/src/main/java/org/apache/batik/apps/svgbrowser/NodePickerPanel.java
1
module Spina class ApplicationController < ActionController::Base include ApplicationHelper private
module Spina class ApplicationController < ActionController::Base protect_from_forgery include ApplicationHelper private
GHSA-2hxv-mx8x-mcj9
{'CWE-352'}
8.8
{'https://github.com/denkGroot/Spina/commit/bfe44f289e336f80b6593032679300c493735e75'}
osv
Spina vulnerable to a cross-site request forgery (CSRF) vulnerability Cross-site request forgery (CSRF) vulnerability in Spina before commit bfe44f289e336f80b6593032679300c493735e75.
2018-08-28
1
https://github.com/denkGroot/Spina
https://github.com/denkGroot/Spina/commit/bfe44f289e336f80b6593032679300c493735e75
bfe44f289e336f80b6593032679300c493735e75
SINGLE
['bfe44f289e336f80b6593032679300c493735e75']
{'2b3e8f724a97b312a61503f378a5ce6def58bfe2'}
bfe44f289e336f80b6593032679300c493735e75
1
06/16/2015, 14:23:27
protect from forgery
Bram Jetten
null
{'additions': 2, 'deletions': 0, 'total': 2}
[ { "additions": 2, "changes": 2, "deletions": 0, "patch": "@@ -1,5 +1,7 @@\n module Spina\n class ApplicationController < ActionController::Base\n+ protect_from_forgery\n+ \n include ApplicationHelper\n \n private", "path": "app/controllers/spina/application_controller.rb", "r...
rb
CWE-352
[ "app/controllers/spina/application_controller.rb" ]
app/controllers/spina/application_controller.rb
1
use Product; use Shop; use Symfony\Component\Translation\TranslatorInterface; use WishList; /** private function getProductsOrCount( if ('products' === $type) { $sortOrder = $query->getSortOrder()->toLegacyOrderBy(true); $querySearch->orderBy($sortOrder . ' ' . $query->getSortOrder()-...
use Product; use Shop; use Symfony\Component\Translation\TranslatorInterface; use Validate; use WishList; /** private function getProductsOrCount( if ('products' === $type) { $sortOrder = $query->getSortOrder()->toLegacyOrderBy(true); $sortWay = $query->getSortOrder()->toLegacyOrderWa...
GHSA-2jx3-5j9v-prpp
{'CWE-89'}
8.1
{'https://github.com/PrestaShop/blockwishlist/commit/b3ec4b85af5fd73f74d55390b226d221298ca084'}
osv
BlockWishList SQL Injection vulnerability ### Impact An authenticated customer can perform SQL injection ### Patches Issue is fixed in 2.1.1
2022-06-25
1
https://github.com/PrestaShop/blockwishlist
https://github.com/PrestaShop/blockwishlist/commit/b3ec4b85af5fd73f74d55390b226d221298ca084
b3ec4b85af5fd73f74d55390b226d221298ca084
SINGLE
['b3ec4b85af5fd73f74d55390b226d221298ca084']
{'13e64b2709544354fd116927b80bc3fa249bc5b4', 'be79516175d564f60a657627482b0a60c3da353e'}
b3ec4b85af5fd73f74d55390b226d221298ca084
1
06/24/2022, 08:04:52
Merge pull request from GHSA-2jx3-5j9v-prpp Validate order by and order way
atomiix
{'com_1': {'author': 'doekia', 'datetime': '07/22/2022, 17:26:35', 'body': "So apparently there is unfiltered value returned by toLegacyOrderWay() (I'm doubt full of it see below)\r\nIf this is the case CHANGE the function, not simply one module otherwise it is an open door for other modules.\r\n\r\nWhy I'm doubtfull ?...
{'additions': 5, 'deletions': 1, 'total': 6}
[ { "additions": 5, "changes": 6, "deletions": 1, "patch": "@@ -35,6 +35,7 @@\n use Product;\n use Shop;\n use Symfony\\Component\\Translation\\TranslatorInterface;\n+use Validate;\n use WishList;\n \n /**\n@@ -167,7 +168,10 @@ private function getProductsOrCount(\n \n if ('products' === $type...
php
CWE-89
[ "src/Search/WishListProductSearchProvider.php" ]
src/Search/WishListProductSearchProvider.php
1
class SummaryTensorOpV2 : public OpKernel { errors::InvalidArgument("tag must be scalar")); const Tensor& tensor = c->input(1); const Tensor& serialized_summary_metadata_tensor = c->input(2); Summary s; Summary::Value* v = s.add_value();
class SummaryTensorOpV2 : public OpKernel { errors::InvalidArgument("tag must be scalar")); const Tensor& tensor = c->input(1); const Tensor& serialized_summary_metadata_tensor = c->input(2); OP_REQUIRES( c, TensorShapeUtils::IsScalar(serialized_summary_metadata_tensor.shape...
GHSA-2p9q-h29j-3f5v
{'CWE-20'}
5.5
{'https://github.com/tensorflow/tensorflow/commit/290bb05c80c327ed74fae1d089f1001b1e2a4ef7'}
osv
Missing validation causes `TensorSummaryV2` to crash ### Impact The implementation of [`tf.raw_ops.TensorSummaryV2`](https://github.com/tensorflow/tensorflow/blob/f3b9bf4c3c0597563b289c0512e98d4ce81f886e/tensorflow/core/kernels/summary_tensor_op.cc#L33-L58) does not fully validate the input arguments. This results in a...
2022-05-24
1
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/290bb05c80c327ed74fae1d089f1001b1e2a4ef7
290bb05c80c327ed74fae1d089f1001b1e2a4ef7
SINGLE
['290bb05c80c327ed74fae1d089f1001b1e2a4ef7']
{'263ad6ad211921b34c5fa5c3460e177d855d1101'}
290bb05c80c327ed74fae1d089f1001b1e2a4ef7
1
04/28/2022, 18:02:25
Fix tf.raw_ops.TensorSummaryV2 vulnerability with invalid serialized_summary_metadata. Check that input is actually a scalar before treating it as such. PiperOrigin-RevId: 445197183
Alan Liu
null
{'additions': 4, 'deletions': 0, 'total': 4}
[ { "additions": 4, "changes": 4, "deletions": 0, "patch": "@@ -36,6 +36,10 @@ class SummaryTensorOpV2 : public OpKernel {\n errors::InvalidArgument(\"tag must be scalar\"));\n const Tensor& tensor = c->input(1);\n const Tensor& serialized_summary_metadata_tensor = c->input(2);...
cc
CWE-20
[ "tensorflow/core/kernels/summary_tensor_op.cc" ]
tensorflow/core/kernels/summary_tensor_op.cc
1
class ResourceGatherOp : public OpKernel { OP_REQUIRES( c, TensorShapeUtils::IsVectorOrHigher(params.shape()), errors::InvalidArgument("params must be at least 1 dimensional")); // Check that we have enough index space const int64_t N = indices.NumElements();
class ResourceGatherOp : public OpKernel { OP_REQUIRES( c, TensorShapeUtils::IsVectorOrHigher(params.shape()), errors::InvalidArgument("params must be at least 1 dimensional")); OP_REQUIRES( c, params.shape().dims() >= batch_dims_, errors::InvalidArgument("params must have at le...
GHSA-2r8p-fg3c-wcj4
{'CWE-125'}
7.3
{'https://github.com/tensorflow/tensorflow/commit/bc9c546ce7015c57c2f15c168b3d9201de679a1d'}
osv
Heap OOB and CHECK fail in `ResourceGather` ### Impact An attacker can trigger a crash via a `CHECK`-fail in debug builds of TensorFlow using `tf.raw_ops.ResourceGather` or a read from outside the bounds of heap allocated data in the same API in a release build: ```python import tensorflow as tf tensor = tf.constant(...
2021-08-25
1
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/bc9c546ce7015c57c2f15c168b3d9201de679a1d
bc9c546ce7015c57c2f15c168b3d9201de679a1d
SINGLE
['bc9c546ce7015c57c2f15c168b3d9201de679a1d']
{'d5f28c9b17220a9c7b3a4c93fc6c3fea6949cadd'}
bc9c546ce7015c57c2f15c168b3d9201de679a1d
1
07/31/2021, 04:37:59
Prevent heap oob access in `resource_variable_ops.cc` PiperOrigin-RevId: 387936433 Change-Id: I9e71ddaa8dbd51ec6afbf163a6b3b591f193b4f6
Mihai Maruseac
null
{'additions': 5, 'deletions': 0, 'total': 5}
[ { "additions": 5, "changes": 5, "deletions": 0, "patch": "@@ -660,6 +660,11 @@ class ResourceGatherOp : public OpKernel {\n OP_REQUIRES(\n c, TensorShapeUtils::IsVectorOrHigher(params.shape()),\n errors::InvalidArgument(\"params must be at least 1 dimensional\"));\n+ OP_REQUIR...
cc
CWE-125
[ "tensorflow/core/kernels/resource_variable_ops.cc" ]
tensorflow/core/kernels/resource_variable_ops.cc
1
def get_markdown(text): if not text: return "" pattern = fr'([\[\s\S\]]*?)\(([\s\S]*?):([\[\s\S\]]*?)\)' # Regex check if re.match(pattern, text): # get get value of group regex
def get_markdown(text): if not text: return "" pattern = fr'([\[\s\S\]]*?)\(([\s\S]*?):([\s\S]*?)\)' # Regex check if re.match(pattern, text): # get get value of group regex
GHSA-2v5j-q74q-r53f
{'CWE-79'}
8.8
{'https://github.com/django-helpdesk/django-helpdesk/commit/a22eb0673fe0b7784f99c6b5fd343b64a6700f06'}
osv
django-helpdesk is vulnerable to Cross-site Scripting django-helpdesk is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').
2021-12-03
1
https://github.com/django-helpdesk/django-helpdesk
https://github.com/django-helpdesk/django-helpdesk/commit/a22eb0673fe0b7784f99c6b5fd343b64a6700f06
a22eb0673fe0b7784f99c6b5fd343b64a6700f06
SINGLE
['a22eb0673fe0b7784f99c6b5fd343b64a6700f06']
{'7097c9c4c0b255ec1f10f3ea14fa2b9c47f6c706'}
a22eb0673fe0b7784f99c6b5fd343b64a6700f06
1
11/19/2021, 16:11:33
Update pattern
noobpk
null
{'additions': 1, 'deletions': 1, 'total': 2}
[ { "additions": 1, "changes": 2, "deletions": 1, "patch": "@@ -56,7 +56,7 @@ def get_markdown(text):\n if not text:\n return \"\"\n \n- pattern = fr'([\\[\\s\\S\\]]*?)\\(([\\s\\S]*?):([\\[\\s\\S\\]]*?)\\)'\n+ pattern = fr'([\\[\\s\\S\\]]*?)\\(([\\s\\S]*?):([\\s\\S]*?)\\)'\n # Re...
py
CWE-79
[ "helpdesk/models.py" ]
helpdesk/models.py
1
public function getFilterCondition($filterJson, ClassDefinition $class, $tablePr } elseif ($filterField == 'id') { $conditionPartsFilters[] = 'oo_id ' . $operator . ' ' . $db->quote($filter['value']); } else { if ($...
public function getFilterCondition($filterJson, ClassDefinition $class, $tablePr } elseif ($filterField == 'id') { $conditionPartsFilters[] = 'oo_id ' . $operator . ' ' . $db->quote($filter['value']); } else { $filt...
GHSA-2v7p-f4qm-r5pc
{'CWE-89'}
7.5
{'https://github.com/pimcore/pimcore/commit/523a735ab94f004459b84ffdfd3db784586bbd82'}
osv
SQL Injection found in Pimcore Pimcore is an open source data & experience management platform. A SQL injection was discovered in GridHelperService.php in GitHub repository pimcore/pimcore prior to 10.3.6.
2022-04-23
1
https://github.com/pimcore/pimcore
https://github.com/pimcore/pimcore/commit/523a735ab94f004459b84ffdfd3db784586bbd82
523a735ab94f004459b84ffdfd3db784586bbd82
SINGLE
['523a735ab94f004459b84ffdfd3db784586bbd82']
{'f29d3b2f305865c6e9884c460fb35bcf21bcf29f'}
523a735ab94f004459b84ffdfd3db784586bbd82
1
04/22/2022, 09:05:32
Fixed column quoting in GridHelperService
Bernhard Rusch
null
{'additions': 5, 'deletions': 2, 'total': 7}
[ { "additions": 5, "changes": 7, "deletions": 2, "patch": "@@ -332,12 +332,13 @@ public function getFilterCondition($filterJson, ClassDefinition $class, $tablePr\n } elseif ($filterField == 'id') {\n $conditionPartsFilters[] = 'oo_id ' . $operator ....
php
CWE-89
[ "bundles/AdminBundle/Helper/GridHelperService.php" ]
bundles/AdminBundle/Helper/GridHelperService.php
1
private void ExtractEntry(string destDir, TarEntry entry, bool allowParentTraver name = name.Replace('/', Path.DirectorySeparatorChar); string destFile = Path.Combine(destDir, name); if (!allowParentTraversal && !Path.GetFullPath(destFile).StartsWith(destDir, StringComparison.InvariantCultureIgnoreCase)) ...
private void ExtractEntry(string destDir, TarEntry entry, bool allowParentTraver name = name.Replace('/', Path.DirectorySeparatorChar); string destFile = Path.Combine(destDir, name); var destFileDir = Path.GetDirectoryName(Path.GetFullPath(destFile)) ?? ""; if (!allowParentTraversal && !destFileDir.Start...
GHSA-2x7h-96h5-rq84
{'CWE-22'}
4
{'https://github.com/icsharpcode/SharpZipLib/commit/5c3b293de5d65b108e7f2cd0ea8f81c1b8273f78'}
osv
Path Traversal in SharpZipLib SharpZipLib (or #ziplib) is a Zip, GZip, Tar and BZip2 library. Starting version 1.3.0 and prior to version 1.3.3, a check was added if the destination file is under destination directory. However, it is not enforced that `destDir` ends with slash. If the `destDir` is not slash terminated ...
2022-02-01
1
https://github.com/icsharpcode/SharpZipLib
https://github.com/icsharpcode/SharpZipLib/commit/5c3b293de5d65b108e7f2cd0ea8f81c1b8273f78
5c3b293de5d65b108e7f2cd0ea8f81c1b8273f78
SINGLE
['5c3b293de5d65b108e7f2cd0ea8f81c1b8273f78']
{'a0e96de70b5264f4c919b09253b1522bc7a221cc'}
5c3b293de5d65b108e7f2cd0ea8f81c1b8273f78
1
09/18/2021, 09:58:11
fix: specialized tar extract traversal
nils måsén
null
{'additions': 2, 'deletions': 1, 'total': 3}
[ { "additions": 2, "changes": 3, "deletions": 1, "patch": "@@ -658,8 +658,9 @@ private void ExtractEntry(string destDir, TarEntry entry, bool allowParentTraver\n \t\t\tname = name.Replace('/', Path.DirectorySeparatorChar);\n \n \t\t\tstring destFile = Path.Combine(destDir, name);\n+\t\t\tvar destFile...
cs
CWE-22
[ "src/ICSharpCode.SharpZipLib/Tar/TarArchive.cs" ]
src/ICSharpCode.SharpZipLib/Tar/TarArchive.cs
1
$report = new ElggReportedContent(); $report->owner_guid = elgg_get_logged_in_user_guid(); $report->title = $title; $report->address = $address; $report->description = $description; $report->access_id = $access;
$report = new ElggReportedContent(); $report->owner_guid = elgg_get_logged_in_user_guid(); $report->title = $title; $report->address = elgg_normalize_site_url($address); $report->description = $description; $report->access_id = $access;
GHSA-2xw8-j43j-5vxp
{'CWE-79'}
5.4
{'https://github.com/elgg/elgg/commit/c30b17bf75256ed3fcc84e2083147cc3951423d0'}
osv
elgg is vulnerable to Cross-site Scripting elgg is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
2022-01-06
1
https://github.com/elgg/elgg
https://github.com/elgg/elgg/commit/c30b17bf75256ed3fcc84e2083147cc3951423d0
c30b17bf75256ed3fcc84e2083147cc3951423d0
SINGLE
['c30b17bf75256ed3fcc84e2083147cc3951423d0']
{'ea72485b6a08f30f452b8e5425310f2b3546050c'}
c30b17bf75256ed3fcc84e2083147cc3951423d0
1
12/06/2021, 14:39:10
fix(reported_content): sanitize report URLs
Jerôme Bakker
null
{'additions': 1, 'deletions': 1, 'total': 2}
[ { "additions": 1, "changes": 2, "deletions": 1, "patch": "@@ -18,7 +18,7 @@\n $report = new ElggReportedContent();\n $report->owner_guid = elgg_get_logged_in_user_guid();\n $report->title = $title;\n-$report->address = $address;\n+$report->address = elgg_normalize_site_url($address);\n $report->desc...
php
CWE-79
[ "mod/reportedcontent/actions/reportedcontent/add.php" ]
mod/reportedcontent/actions/reportedcontent/add.php
1
private function loadDataGrid(): void 'registered_on', true ); // add the mass action controls $this->dgProfiles->setMassActionCheckboxes('check', '[id]');
private function loadDataGrid(): void 'registered_on', true ); $this->dgProfiles->setColumnFunction('htmlspecialchars', ['[display_name]'], 'display_name'); // add the mass action controls $this->dgProfiles->setMassActionCheckboxes('check', '[id]');
GHSA-3374-7h99-xr85
{'CWE-79'}
5.4
{'https://github.com/forkcms/forkcms/commit/6ec6171206a7507a39695edc8bbd1b97ef1041c6'}
osv
Cross-site scripting in forkcms Fork CMS Content Management System v5.8.0 was discovered to contain a cross-site scripting (XSS) vulnerability in the `Displayname` field when using the `Add`, `Edit` or `Register' functions. This vulnerability allows attackers to execute arbitrary web scripts or HTML.
2021-10-25
1
https://github.com/forkcms/forkcms
https://github.com/forkcms/forkcms/commit/6ec6171206a7507a39695edc8bbd1b97ef1041c6
6ec6171206a7507a39695edc8bbd1b97ef1041c6
SINGLE
['6ec6171206a7507a39695edc8bbd1b97ef1041c6']
{'f439d630c2f46a85b251488cd7073068a66fae5c'}
6ec6171206a7507a39695edc8bbd1b97ef1041c6
1
04/17/2020, 10:44:12
Fix xss in profiles display name
Jelmer Prins
null
{'additions': 1, 'deletions': 0, 'total': 1}
[ { "additions": 1, "changes": 1, "deletions": 0, "patch": "@@ -128,6 +128,7 @@ private function loadDataGrid(): void\n 'registered_on',\n true\n );\n+ $this->dgProfiles->setColumnFunction('htmlspecialchars', ['[display_name]'], 'display_name');\n \n // a...
php
CWE-79
[ "src/Backend/Modules/Profiles/Actions/Index.php" ]
src/Backend/Modules/Profiles/Actions/Index.php
1
module.exports = { reply_to_object: replyToObject, print: print, err_code: /^([A-Z]+)\s+(.+)$/, monitor_regex: /^[0-9]{10,11}\.[0-9]+ \[[0-9]+ .+\]( ".+?")+$/, clone: convenienceClone, callback_or_emit: callbackOrEmit, reply_in_order: replyInOrder
module.exports = { reply_to_object: replyToObject, print: print, err_code: /^([A-Z]+)\s+(.+)$/, monitor_regex: /^[0-9]{10,11}\.[0-9]+ \[[0-9]+ .+\].*"$/, clone: convenienceClone, callback_or_emit: callbackOrEmit, reply_in_order: replyInOrder
GHSA-35q2-47q7-3pc3
{'CWE-400'}
7.5
{'https://github.com/NodeRedis/node-redis/commit/2d11b6dc9b9774464a91fb4b448bad8bf699629e'}
osv
Node-Redis potential exponential regex in monitor mode ### Impact When a client is in monitoring mode, the regex begin used to detected monitor messages could cause exponential backtracking on some strings. This issue could lead to a denial of service. ### Patches The problem was fixed in commit [`2d11b6d`](https://gi...
2021-04-27
1
https://github.com/NodeRedis/node-redis
https://github.com/NodeRedis/node-redis/commit/2d11b6dc9b9774464a91fb4b448bad8bf699629e
2d11b6dc9b9774464a91fb4b448bad8bf699629e
SINGLE
['2d11b6dc9b9774464a91fb4b448bad8bf699629e']
{'7e77de84bc80b0742321939c59612dc27559bbff'}
2d11b6dc9b9774464a91fb4b448bad8bf699629e
1
04/08/2021, 22:04:34
fix #1569 - improve monitor_regex (#1595) Co-authored-by: Guy Korland <gkorland@gmail.com>
Leibale Eidelman
{'com_1': {'author': 'Plavit', 'datetime': '04/27/2021, 21:27:30', 'body': 'lemme check compatibility'}}
{'additions': 1, 'deletions': 1, 'total': 2}
[ { "additions": 1, "changes": 2, "deletions": 1, "patch": "@@ -127,7 +127,7 @@ module.exports = {\n reply_to_object: replyToObject,\n print: print,\n err_code: /^([A-Z]+)\\s+(.+)$/,\n- monitor_regex: /^[0-9]{10,11}\\.[0-9]+ \\[[0-9]+ .+\\]( \".+?\")+$/,\n+ monitor_regex: /^[0-9]{10,...
js
CWE-400
[ "lib/utils.js" ]
lib/utils.js
1
/* * Copyright 2002-2020 the original author or authors. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. import java.beans.PropertyDescriptor; import java.lang.reflect.Method; import java.lang.reflect.Modifier; import java.util....
/* * Copyright 2002-2022 the original author or authors. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. import java.beans.PropertyDescriptor; import java.lang.reflect.Method; import java.lang.reflect.Modifier; import java.secur...
GHSA-36p3-wjmg-h94x
{'CWE-74', 'CWE-94'}
9.8
{'https://github.com/spring-projects/spring-framework/commit/002546b3e4b8d791ea6acccb81eb3168f51abb15'}
osv
Remote Code Execution in Spring Framework Spring Framework prior to versions 5.2.20 and 5.3.18 contains a remote code execution vulnerability known as `Spring4Shell`. ## Impact A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific...
2022-03-31
1
https://github.com/spring-projects/spring-framework
https://github.com/spring-projects/spring-framework/commit/002546b3e4b8d791ea6acccb81eb3168f51abb15
002546b3e4b8d791ea6acccb81eb3168f51abb15
SINGLE
['002546b3e4b8d791ea6acccb81eb3168f51abb15']
{'1627f57f1f77abe17dd607c75476b9e4cb22ffbb'}
002546b3e4b8d791ea6acccb81eb3168f51abb15
1
03/31/2022, 07:34:51
Refine PropertyDescriptor filtering Restrict property paths under `Class` and properties of types `ClassLoader` or `ProtectionDomain`.
Brian Clozel
null
{'additions': 14, 'deletions': 4, 'total': 18}
[ { "additions": 14, "changes": 18, "deletions": 4, "patch": "@@ -1,5 +1,5 @@\n /*\n- * Copyright 2002-2020 the original author or authors.\n+ * Copyright 2002-2022 the original author or authors.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this fil...
java
CWE-94
[ "spring-beans/src/main/java/org/springframework/beans/CachedIntrospectionResults.java" ]
spring-beans/src/main/java/org/springframework/beans/CachedIntrospectionResults.java
1
class SparseBincountOp : public OpKernel { for (int64_t i = 0; i < indices_mat.dimension(0); ++i) { const int64_t batch = indices_mat(i, 0); const Tidx bin = values(i); if (bin < size) { if (binary_output_) { out(batch, bin) = T(1);
class SparseBincountOp : public OpKernel { for (int64_t i = 0; i < indices_mat.dimension(0); ++i) { const int64_t batch = indices_mat(i, 0); const Tidx bin = values(i); OP_REQUIRES( ctx, batch < out.dimension(0), errors::InvalidArgument("Index out of bound. `batch`...
GHSA-374m-jm66-3vj8
{'CWE-125'}
7.1
{'https://github.com/tensorflow/tensorflow/commit/f410212e373eb2aec4c9e60bf3702eba99a38aba'}
osv
Heap OOB in `SparseBinCount` ### Impact The [implementation](https://github.com/tensorflow/tensorflow/blob/e71b86d47f8bc1816bf54d7bddc4170e47670b97/tensorflow/core/kernels/bincount_op.cc#L353-L417) of `SparseBinCount` is vulnerable to a heap OOB: ```python import tensorflow as tf tf.raw_ops.SparseBincount( ind...
2021-11-10
1
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/f410212e373eb2aec4c9e60bf3702eba99a38aba
f410212e373eb2aec4c9e60bf3702eba99a38aba
SINGLE
['f410212e373eb2aec4c9e60bf3702eba99a38aba']
{'4656caa7d74420454da967288af143ec73fb4c9b'}
f410212e373eb2aec4c9e60bf3702eba99a38aba
1
09/30/2021, 13:36:55
Prevent out-of-bound accesses in SparseBincount. PiperOrigin-RevId: 399918616 Change-Id: I11d154f4444d3fde1f09c5c40628b8671791a30d
Penporn Koanantakool
null
{'additions': 10, 'deletions': 0, 'total': 10}
[ { "additions": 10, "changes": 10, "deletions": 0, "patch": "@@ -405,6 +405,16 @@ class SparseBincountOp : public OpKernel {\n for (int64_t i = 0; i < indices_mat.dimension(0); ++i) {\n const int64_t batch = indices_mat(i, 0);\n const Tidx bin = values(i);\n+ OP_REQUIRES(...
cc
CWE-125
[ "tensorflow/core/kernels/bincount_op.cc" ]
tensorflow/core/kernels/bincount_op.cc
1
class HMRServer { this.server = https.createServer(await getCertificate(options.https)); } this.wss = new WebSocket.Server({server: this.server}); this.server.listen(options.hmrPort, resolve); });
class HMRServer { this.server = https.createServer(await getCertificate(options.https)); } let websocketOptions = { server: this.server }; if (options.hmrHostname) { websocketOptions.origin = `${options.https ? 'https' : 'http'}://${ options.hmrHostname ...
GHSA-37q6-576q-vgr7
{'CWE-200'}
7.5
{'https://github.com/parcel-bundler/parcel/commit/066e0bf6bd26b15c78bd47df023452e4b20073e4'}
osv
Missing Origin Validation in parcel-bundler Versions of `parcel-bundler` before 1.10.0 are missing origin validation on the websocket server. This vulnerability allows a remote attacker to steal a developer's source code because the origin of requests to the websocket server that is used for Hot Module Replacement (HMR...
2018-10-30
1
https://github.com/parcel-bundler/parcel
https://github.com/parcel-bundler/parcel/commit/066e0bf6bd26b15c78bd47df023452e4b20073e4
066e0bf6bd26b15c78bd47df023452e4b20073e4
SINGLE
['066e0bf6bd26b15c78bd47df023452e4b20073e4']
{'948159b99adbc74857b380576e1e104a9097f259'}
066e0bf6bd26b15c78bd47df023452e4b20073e4
1
09/25/2018, 03:49:56
fix security vuln (#1794)
Jasper De Moor
null
{'additions': 11, 'deletions': 1, 'total': 12}
[ { "additions": 11, "changes": 12, "deletions": 1, "patch": "@@ -17,7 +17,17 @@ class HMRServer {\n this.server = https.createServer(await getCertificate(options.https));\n }\n \n- this.wss = new WebSocket.Server({server: this.server});\n+ let websocketOptions = {\n+ se...
js
CWE-200
[ "packages/core/parcel-bundler/src/HMRServer.js" ]
packages/core/parcel-bundler/src/HMRServer.js
1
End of preview. Expand in Data Studio

Do Language Models Prefer Vulnerable Code? A Probabilistic Study of Insecure Code Preference

📚 Citation

If you use this work in your research, please cite:

@inproceedings{melo2026vulnerable,
  title     = {Do Language Models Prefer Vulnerable Code? A Probabilistic Study of Insecure Code Preference},
  author    = {Melo, Rui and Reis, Sofia and Catarino, Andre and Abreu, Rui},
  booktitle = {Proceedings of the IEEE International Conference on Software Testing, Verification and Validation (ICST)},
  year      = {2026},
  publisher = {IEEE}
}
Downloads last month
16

Collections including rufimelo/DeltaSecommits