Dataset Viewer
id
stringlengths 13
15
| title
stringlengths 0
212
| description
stringlengths 95
3.88k
| patches
listlengths 1
14
| cwe
stringlengths 0
101
|
---|---|---|---|---|
CVE-2024-12718
|
Bypass extraction filter to modify file metadata outside extraction directory
| "Allows modifying some file metadata (e.g. last modified) with filter=\"data\"聽or file permissions (...TRUNCATED) | [{"url":"https://github.com/python/cpython/commit/28463dba112af719df1e8b0391c46787ad756dd9","patch_t(...TRUNCATED) |
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
|
CVE-2024-9287
|
Virtual environment (venv) activation scripts don't quote paths
| "A vulnerability has been found in the CPython `venv` module and CLI where path names provided when (...TRUNCATED) | [{"url":"https://github.com/python/cpython/commit/9286ab3a107ea41bd3f3c3682ce2512692bdded8","patch_t(...TRUNCATED) |
CWE-428 Unquoted Search Path or Element
|
CVE-2025-7953
|
Sanluan PublicCMS viewer.html redirect
| "A vulnerability, which was classified as problematic, has been found in Sanluan PublicCMS up to 5.2(...TRUNCATED) | [{"url":"https://github.com/sanluan/PublicCMS/commit/f1af17af004ca9345c6fe4d5936d87d008d26e75","patc(...TRUNCATED) |
CWE-601 - Open Redirect
|
CVE-2025-7783
|
Usage of unsafe random function in form-data for choosing boundary
| "Use of Insufficiently Random Values vulnerability in form-data allows HTTP Parameter Pollution (HPP(...TRUNCATED) | [{"url":"https://github.com/form-data/form-data/commit/3d1723080e6577a66f17f163ecd345a21d8d0fd0","pa(...TRUNCATED) |
CWE-330 Use of Insufficiently Random Values
|
CVE-2025-7863
|
thinkgem JeeSite ServletUtils.java redirectUrl
| "A vulnerability was found in thinkgem JeeSite up to 5.12.0 and classified as problematic. Affected (...TRUNCATED) | [{"url":"https://github.com/thinkgem/jeesite5/commit/3d06b8d009d0267f0255acc87ea19d29d07cedc3","patc(...TRUNCATED) |
CWE-601 - Open Redirect
|
CVE-2025-7949
|
Sanluan PublicCMS preview.html redirect
| "A vulnerability was found in Sanluan PublicCMS up to 5.202506.a. It has been declared as problemati(...TRUNCATED) | [{"url":"https://github.com/sanluan/PublicCMS/commit/c1e79f124e3f4c458315d908ed7dee06f9f12a76","patc(...TRUNCATED) |
CWE-601 - Open Redirect
|
CVE-2025-7864
|
thinkgem JeeSite FileUploadController.java upload unrestricted upload
| "A vulnerability was found in thinkgem JeeSite up to 5.12.0. It has been classified as critical. Thi(...TRUNCATED) | [{"url":"https://github.com/thinkgem/jeesite5/commit/3585737d21fe490ff6948d913fcbd8d99c41fc08","patc(...TRUNCATED) |
CWE-434 - Unrestricted Upload
|
CVE-2025-7865
|
thinkgem JeeSite XSS Filter EncodeUtils.java xssFilter cross site scripting
| "A vulnerability was found in thinkgem JeeSite up to 5.12.0. It has been declared as problematic. Th(...TRUNCATED) | [{"url":"https://github.com/thinkgem/jeesite5/commit/3585737d21fe490ff6948d913fcbd8d99c41fc08","patc(...TRUNCATED) |
CWE-79 - Cross Site Scripting
|
CVE-2025-7797
|
GPAC dash_client.c gf_dash_download_init_segment null pointer dereference
| "A vulnerability was found in GPAC up to 2.4. It has been rated as problematic. Affected by this iss(...TRUNCATED) | [{"url":"https://github.com/gpac/gpac/commit/153ea314b6b053db17164f8bc3c7e1e460938eaa","patch_text_b(...TRUNCATED) |
CWE-476 - NULL Pointer Dereference
|
CVE-2025-7759
|
thinkgem JeeSite UEditor Image Grabber ActionEnter.java server-side request forgery
| "A vulnerability, which was classified as critical, was found in thinkgem JeeSite up to 5.12.0. This(...TRUNCATED) | [{"url":"https://github.com/thinkgem/jeesite5/commit/1c5e49b0818037452148e0f8ff69ed04cb8fefdc","patc(...TRUNCATED) |
CWE-918 - Server-Side Request Forgery
|
End of preview. Expand
in Data Studio
README.md exists but content is empty.
- Downloads last month
- 52