Datasets:

Modalities:
Text
Formats:
parquet
Size:
< 1K
Libraries:
Datasets
pandas
Dataset Viewer
Auto-converted to Parquet
id
stringlengths
13
15
title
stringlengths
0
212
description
stringlengths
95
3.88k
patches
listlengths
1
14
cwe
stringlengths
0
101
CVE-2024-12718
Bypass extraction filter to modify file metadata outside extraction directory
"Allows modifying some file metadata (e.g. last modified) with filter=\"data\"聽or file permissions (...TRUNCATED)
[{"url":"https://github.com/python/cpython/commit/28463dba112af719df1e8b0391c46787ad756dd9","patch_t(...TRUNCATED)
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2024-9287
Virtual environment (venv) activation scripts don't quote paths
"A vulnerability has been found in the CPython `venv` module and CLI where path names provided when (...TRUNCATED)
[{"url":"https://github.com/python/cpython/commit/9286ab3a107ea41bd3f3c3682ce2512692bdded8","patch_t(...TRUNCATED)
CWE-428 Unquoted Search Path or Element
CVE-2025-7953
Sanluan PublicCMS viewer.html redirect
"A vulnerability, which was classified as problematic, has been found in Sanluan PublicCMS up to 5.2(...TRUNCATED)
[{"url":"https://github.com/sanluan/PublicCMS/commit/f1af17af004ca9345c6fe4d5936d87d008d26e75","patc(...TRUNCATED)
CWE-601 - Open Redirect
CVE-2025-7783
Usage of unsafe random function in form-data for choosing boundary
"Use of Insufficiently Random Values vulnerability in form-data allows HTTP Parameter Pollution (HPP(...TRUNCATED)
[{"url":"https://github.com/form-data/form-data/commit/3d1723080e6577a66f17f163ecd345a21d8d0fd0","pa(...TRUNCATED)
CWE-330 Use of Insufficiently Random Values
CVE-2025-7863
thinkgem JeeSite ServletUtils.java redirectUrl
"A vulnerability was found in thinkgem JeeSite up to 5.12.0 and classified as problematic. Affected (...TRUNCATED)
[{"url":"https://github.com/thinkgem/jeesite5/commit/3d06b8d009d0267f0255acc87ea19d29d07cedc3","patc(...TRUNCATED)
CWE-601 - Open Redirect
CVE-2025-7949
Sanluan PublicCMS preview.html redirect
"A vulnerability was found in Sanluan PublicCMS up to 5.202506.a. It has been declared as problemati(...TRUNCATED)
[{"url":"https://github.com/sanluan/PublicCMS/commit/c1e79f124e3f4c458315d908ed7dee06f9f12a76","patc(...TRUNCATED)
CWE-601 - Open Redirect
CVE-2025-7864
thinkgem JeeSite FileUploadController.java upload unrestricted upload
"A vulnerability was found in thinkgem JeeSite up to 5.12.0. It has been classified as critical. Thi(...TRUNCATED)
[{"url":"https://github.com/thinkgem/jeesite5/commit/3585737d21fe490ff6948d913fcbd8d99c41fc08","patc(...TRUNCATED)
CWE-434 - Unrestricted Upload
CVE-2025-7865
thinkgem JeeSite XSS Filter EncodeUtils.java xssFilter cross site scripting
"A vulnerability was found in thinkgem JeeSite up to 5.12.0. It has been declared as problematic. Th(...TRUNCATED)
[{"url":"https://github.com/thinkgem/jeesite5/commit/3585737d21fe490ff6948d913fcbd8d99c41fc08","patc(...TRUNCATED)
CWE-79 - Cross Site Scripting
CVE-2025-7797
GPAC dash_client.c gf_dash_download_init_segment null pointer dereference
"A vulnerability was found in GPAC up to 2.4. It has been rated as problematic. Affected by this iss(...TRUNCATED)
[{"url":"https://github.com/gpac/gpac/commit/153ea314b6b053db17164f8bc3c7e1e460938eaa","patch_text_b(...TRUNCATED)
CWE-476 - NULL Pointer Dereference
CVE-2025-7759
thinkgem JeeSite UEditor Image Grabber ActionEnter.java server-side request forgery
"A vulnerability, which was classified as critical, was found in thinkgem JeeSite up to 5.12.0. This(...TRUNCATED)
[{"url":"https://github.com/thinkgem/jeesite5/commit/1c5e49b0818037452148e0f8ff69ed04cb8fefdc","patc(...TRUNCATED)
CWE-918 - Server-Side Request Forgery
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
52