The full dataset viewer is not available (click to read why). Only showing a preview of the rows.
The dataset generation failed
Error code: DatasetGenerationError
Exception: ArrowInvalid
Message: Failed to parse string: 'visit repo url' as a scalar of type timestamp[s]
Traceback: Traceback (most recent call last):
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 1871, in _prepare_split_single
writer.write_table(table)
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/arrow_writer.py", line 623, in write_table
pa_table = table_cast(pa_table, self._schema)
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 2293, in table_cast
return cast_table_to_schema(table, schema)
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 2246, in cast_table_to_schema
arrays = [
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 2247, in <listcomp>
cast_array_to_feature(
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 1796, in wrapper
return pa.chunked_array([func(chunk, *args, **kwargs) for chunk in array.chunks])
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 1796, in <listcomp>
return pa.chunked_array([func(chunk, *args, **kwargs) for chunk in array.chunks])
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 2014, in cast_array_to_feature
casted_array_values = _c(array.values, feature[0])
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 1798, in wrapper
return func(array, *args, **kwargs)
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 2006, in cast_array_to_feature
arrays = [
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 2007, in <listcomp>
_c(array.field(name) if name in array_fields else null_array, subfeature)
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 1798, in wrapper
return func(array, *args, **kwargs)
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 2006, in cast_array_to_feature
arrays = [
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 2007, in <listcomp>
_c(array.field(name) if name in array_fields else null_array, subfeature)
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 1798, in wrapper
return func(array, *args, **kwargs)
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 2006, in cast_array_to_feature
arrays = [
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 2007, in <listcomp>
_c(array.field(name) if name in array_fields else null_array, subfeature)
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 1798, in wrapper
return func(array, *args, **kwargs)
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 2103, in cast_array_to_feature
return array_cast(
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 1798, in wrapper
return func(array, *args, **kwargs)
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 1950, in array_cast
return array.cast(pa_type)
File "pyarrow/array.pxi", line 996, in pyarrow.lib.Array.cast
File "/src/services/worker/.venv/lib/python3.9/site-packages/pyarrow/compute.py", line 404, in cast
return call_function("cast", [arr], options, memory_pool)
File "pyarrow/_compute.pyx", line 590, in pyarrow._compute.call_function
File "pyarrow/_compute.pyx", line 385, in pyarrow._compute.Function.call
File "pyarrow/error.pxi", line 154, in pyarrow.lib.pyarrow_internal_check_status
File "pyarrow/error.pxi", line 91, in pyarrow.lib.check_status
pyarrow.lib.ArrowInvalid: Failed to parse string: 'visit repo url' as a scalar of type timestamp[s]
The above exception was the direct cause of the following exception:
Traceback (most recent call last):
File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 1433, in compute_config_parquet_and_info_response
parquet_operations, partial, estimated_dataset_info = stream_convert_to_parquet(
File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 989, in stream_convert_to_parquet
builder._prepare_split(
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 1742, in _prepare_split
for job_id, done, content in self._prepare_split_single(
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 1898, in _prepare_split_single
raise DatasetGenerationError("An error occurred while generating the dataset") from e
datasets.exceptions.DatasetGenerationError: An error occurred while generating the datasetNeed help to make the dataset viewer work? Make sure to review how to configure the dataset viewer, and open a discussion for direct support.
cve_id string | published_date timestamp[us] | last_modified_date timestamp[us] | description string | nodes string | severity string | obtain_all_privilege string | obtain_user_privilege string | obtain_other_privilege string | user_interaction_required string | cvss2_vector_string string | cvss2_access_vector string | cvss2_access_complexity string | cvss2_authentication string | cvss2_confidentiality_impact string | cvss2_integrity_impact string | cvss2_availability_impact string | cvss2_base_score string | cvss3_vector_string string | cvss3_attack_vector string | cvss3_attack_complexity string | cvss3_privileges_required string | cvss3_user_interaction string | cvss3_scope string | cvss3_confidentiality_impact string | cvss3_integrity_impact string | cvss3_availability_impact string | cvss3_base_score string | cvss3_base_severity string | exploitability_score string | impact_score string | ac_insuf_info string | reference_json string | problemtype_json string | cwe_info list | fixes_info list |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2013-7283 | 2014-01-09T18:07:00 | 2014-01-10T15:07:00 | [{'lang': 'en', 'value': 'Race condition in the libreswan.spec files for Red Hat Enterprise Linux (RHEL) and Fedora packages in libreswan 3.6 has unspecified impact and attack vectors, involving the /var/tmp/libreswan-nss-pwd temporary file.'}] | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:libreswan:libreswan:3.6:*:*:*:*:*:*:*', 'cpe_name': []}]}] | HIGH | False | False | False | False | AV:N/AC:M/Au:N/C:C/I:C/A:C | NETWORK | MEDIUM | NONE | COMPLETE | COMPLETE | COMPLETE | 9.3 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/libreswan/libreswan/commit/ef2d756e73a188401c36133c2e2f7ce4f3c6ae55', 'name': 'https://github.com/libreswan/libreswan/commit/ef2d756e73a188401c36133c2e2f7ce4f3c6ae55', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch']}, {'url': 'http://www.osvdb.org/101575', 'name': '101575', 'refsource': 'OSVDB', 'tags': []}, {'url': 'https://lists.libreswan.org/pipermail/swan-announce/2013/000007.html', 'name': '[Swan-announce] 20131211 Libreswan 3.7 released', 'refsource': 'MLIST', 'tags': ['Vendor Advisory']}, {'url': 'http://secunia.com/advisories/56276', 'name': '56276', 'refsource': 'SECUNIA', 'tags': ['Vendor Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-362'}]}] | [
{
"index": 500,
"cwe_id": "CWE-362",
"cwe_name": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')",
"description": "The product contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access t... | [
{
"cve_id": "CVE-2013-7283",
"hash": "ef2d756e73a188401c36133c2e2f7ce4f3c6ae55",
"repo_url": "https://github.com/libreswan/libreswan",
"commit_details": {
"hash": "ef2d756e73a188401c36133c2e2f7ce4f3c6ae55",
"repo_url": "https://github.com/libreswan/libreswan",
"author": "Tuomo Soin... |
CVE-2022-28368 | 2022-04-03T03:15:00 | 2023-08-08T14:22:00 | [{'lang': 'en', 'value': 'Dompdf 1.2.1 allows remote code execution via a .php file in the src:url field of an @font-face Cascading Style Sheets (CSS) statement (within an HTML input file).'}] | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:dompdf_project:dompdf:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.2.1', 'cpe_name': []}]}] | HIGH | False | False | False | False | AV:N/AC:L/Au:N/C:P/I:P/A:P | NETWORK | LOW | NONE | PARTIAL | PARTIAL | PARTIAL | 7.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 9.8 | CRITICAL | 3.9 | 5.9 | False | [{'url': 'https://github.com/snyk-labs/php-goof', 'name': 'https://github.com/snyk-labs/php-goof', 'refsource': 'MISC', 'tags': ['Third Party Advisory']}, {'url': 'https://packagist.org/packages/dompdf/dompdf#v1.2.1', 'name': 'https://packagist.org/packages/dompdf/dompdf#v1.2.1', 'refsource': 'MISC', 'tags': ['Product', 'Third Party Advisory']}, {'url': 'https://snyk.io/blog/security-alert-php-pdf-library-dompdf-rce/', 'name': 'https://snyk.io/blog/security-alert-php-pdf-library-dompdf-rce/', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory']}, {'url': 'https://github.com/dompdf/dompdf/commit/4c70e1025bcd9b7694b95dd552499bd83cd6141d', 'name': 'https://github.com/dompdf/dompdf/commit/4c70e1025bcd9b7694b95dd552499bd83cd6141d', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://github.com/dompdf/dompdf/pull/2808', 'name': 'https://github.com/dompdf/dompdf/pull/2808', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://github.com/dompdf/dompdf/issues/2598', 'name': 'https://github.com/dompdf/dompdf/issues/2598', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://packetstormsecurity.com/files/171738/Dompdf-1.2.1-Remote-Code-Execution.html', 'name': 'http://packetstormsecurity.com/files/171738/Dompdf-1.2.1-Remote-Code-Execution.html', 'refsource': 'MISC', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'CWE-79'}]}] | [
{
"index": 878,
"cwe_id": "CWE-79",
"cwe_name": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
"description": "The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is ... | [
{
"cve_id": "CVE-2022-28368",
"hash": "4c70e1025bcd9b7694b95dd552499bd83cd6141d",
"repo_url": "https://github.com/dompdf/dompdf",
"commit_details": {
"hash": "4c70e1025bcd9b7694b95dd552499bd83cd6141d",
"repo_url": "https://github.com/dompdf/dompdf",
"author": "Brian Sweeney",
... |
CVE-2017-9203 | 2017-05-23T04:29:00 | 2019-10-03T00:03:00 | "[{'lang': 'en', 'value': 'imagew-main.c:960:12 in libimageworsener.a in ImageWorsener 1.3.1 allows (...TRUNCATED) | "[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:entro(...TRUNCATED) | MEDIUM | False | False | False | True | AV:N/AC:M/Au:N/C:N/I:N/A:P | NETWORK | MEDIUM | NONE | NONE | NONE | PARTIAL | 4.3 | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H | NETWORK | LOW | NONE | REQUIRED | UNCHANGED | NONE | NONE | HIGH | 6.5 | MEDIUM | 2.8 | 3.6 | nan | "[{'url': 'https://github.com/jsummers/imageworsener/commit/a4f247707f08e322f0b41e82c3e06e224240a654(...TRUNCATED) | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | [{"index":875,"cwe_id":"CWE-787","cwe_name":"Out-of-bounds Write","description":"The product writes (...TRUNCATED) | [{"cve_id":"CVE-2017-9203","hash":"a4f247707f08e322f0b41e82c3e06e224240a654","repo_url":"https://git(...TRUNCATED) |
CVE-2022-24810 | 2024-04-16T20:15:00 | 2024-04-17T12:48:00 | "[{'lang': 'en', 'value': 'net-snmp provides various tools relating to the Simple Network Management(...TRUNCATED) | [] | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | "[{'url': 'https://github.com/net-snmp/net-snmp/commit/ce66eb97c17aa9a48bc079be7b65895266fa6775', 'n(...TRUNCATED) | [{'description': []}] | [{"index":1373,"cwe_id":"NVD-CWE-noinfo","cwe_name":"Insufficient Information","description":"There (...TRUNCATED) | [{"cve_id":"CVE-2022-24810","hash":"ce66eb97c17aa9a48bc079be7b65895266fa6775","repo_url":"https://gi(...TRUNCATED) |
CVE-2018-1999015 | 2018-07-23T15:29:00 | 2018-09-20T16:22:00 | "[{'lang': 'en', 'value': 'FFmpeg before commit 5aba5b89d0b1d73164d3b81764828bb8b20ff32a contains an(...TRUNCATED) | "[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:ffmpe(...TRUNCATED) | MEDIUM | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:N/A:N | NETWORK | MEDIUM | NONE | PARTIAL | NONE | NONE | 4.3 | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N | NETWORK | LOW | NONE | REQUIRED | UNCHANGED | HIGH | NONE | NONE | 6.5 | MEDIUM | 2.8 | 3.6 | nan | "[{'url': 'https://github.com/FFmpeg/FFmpeg/commit/5aba5b89d0b1d73164d3b81764828bb8b20ff32a', 'name'(...TRUNCATED) | [{'description': [{'lang': 'en', 'value': 'CWE-125'}]}] | [{"index":159,"cwe_id":"CWE-125","cwe_name":"Out-of-bounds Read","description":"The product reads da(...TRUNCATED) | [{"cve_id":"CVE-2018-1999015","hash":"5aba5b89d0b1d73164d3b81764828bb8b20ff32a","repo_url":"https://(...TRUNCATED) |
CVE-2018-13300 | 2018-07-05T17:29:00 | 2021-01-04T18:15:00 | "[{'lang': 'en', 'value': 'In FFmpeg 3.2 and 4.0.1, an improper argument (AVCodecParameters) passed (...TRUNCATED) | "[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:ffmpe(...TRUNCATED) | MEDIUM | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:N/A:P | NETWORK | MEDIUM | NONE | PARTIAL | NONE | PARTIAL | 5.8 | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H | NETWORK | LOW | NONE | REQUIRED | UNCHANGED | HIGH | NONE | HIGH | 8.1 | HIGH | 2.8 | 5.2 | False | "[{'url': 'https://github.com/FFmpeg/FFmpeg/commit/95556e27e2c1d56d9e18f5db34d6f756f3011148', 'name'(...TRUNCATED) | [{'description': [{'lang': 'en', 'value': 'CWE-125'}]}] | [{"index":159,"cwe_id":"CWE-125","cwe_name":"Out-of-bounds Read","description":"The product reads da(...TRUNCATED) | [{"cve_id":"CVE-2018-13300","hash":"95556e27e2c1d56d9e18f5db34d6f756f3011148","repo_url":"https://gi(...TRUNCATED) |
CVE-2022-3327 | 2022-10-20T00:15:00 | 2022-10-24T12:58:00 | "[{'lang': 'en', 'value': 'Missing Authentication for Critical Function in GitHub repository ikus060(...TRUNCATED) | "[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:ikus-(...TRUNCATED) | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 9.8 | CRITICAL | 3.9 | 5.9 | nan | "[{'url': 'https://github.com/ikus060/rdiffweb/commit/f2a32f2a9f3fb8be1a9432ac3d81d3aacdb13095', 'na(...TRUNCATED) | [{'description': [{'lang': 'en', 'value': 'CWE-306'}]}] | [{"index":442,"cwe_id":"CWE-306","cwe_name":"Missing Authentication for Critical Function","descript(...TRUNCATED) | [{"cve_id":"CVE-2022-3327","hash":"f2a32f2a9f3fb8be1a9432ac3d81d3aacdb13095","repo_url":"https://git(...TRUNCATED) |
CVE-2014-3535 | 2014-09-28T19:55:00 | 2023-02-13T00:40:00 | "[{'lang': 'en', 'value': 'include/linux/netdevice.h in the Linux kernel before 2.6.36 incorrectly u(...TRUNCATED) | "[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:linux(...TRUNCATED) | HIGH | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:C | NETWORK | LOW | NONE | NONE | NONE | COMPLETE | 7.8 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | False | "[{'url': 'https://github.com/torvalds/linux/commit/256df2f3879efdb2e9808bdb1b54b16fbb11fa38', 'name(...TRUNCATED) | [{'description': [{'lang': 'en', 'value': 'CWE-119'}]}] | [{"index":122,"cwe_id":"CWE-119","cwe_name":"Improper Restriction of Operations within the Bounds of(...TRUNCATED) | [{"cve_id":"CVE-2014-3535","hash":"256df2f3879efdb2e9808bdb1b54b16fbb11fa38","repo_url":"https://git(...TRUNCATED) |
CVE-2019-16941 | 2019-09-28T16:15:00 | 2019-10-04T21:15:00 | "[{'lang': 'en', 'value': 'NSA Ghidra through 9.0.4, when experimental mode is enabled, allows arbit(...TRUNCATED) | "[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:nsa:g(...TRUNCATED) | MEDIUM | False | False | False | False | AV:N/AC:M/Au:N/C:P/I:P/A:P | NETWORK | MEDIUM | NONE | PARTIAL | PARTIAL | PARTIAL | 6.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 9.8 | CRITICAL | 3.9 | 5.9 | False | "[{'url': 'https://github.com/NationalSecurityAgency/ghidra/issues/1090', 'name': 'https://github.co(...TRUNCATED) | [{'description': [{'lang': 'en', 'value': 'CWE-91'}]}] | [{"index":933,"cwe_id":"CWE-91","cwe_name":"XML Injection (aka Blind XPath Injection)","description"(...TRUNCATED) | [{"cve_id":"CVE-2019-16941","hash":"a17728f8c12effa171b17a25ccfb7e7d9528c5d0","repo_url":"https://gi(...TRUNCATED) |
CVE-2023-28081 | 2023-05-18T22:15:00 | 2023-11-07T04:10:00 | "[{'lang': 'en', 'value': 'A bytecode optimization bug in Hermes prior to commit e6ed9c1a4b02dc219de(...TRUNCATED) | "[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:faceb(...TRUNCATED) | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 9.8 | CRITICAL | 3.9 | 5.9 | nan | "[{'url': 'https://github.com/facebook/hermes/commit/e6ed9c1a4b02dc219de1648f44cd808a56171b81', 'nam(...TRUNCATED) | [{'description': [{'lang': 'en', 'value': 'CWE-416'}]}] | [{"index":549,"cwe_id":"CWE-416","cwe_name":"Use After Free","description":"The product reuses or re(...TRUNCATED) | [{"cve_id":"CVE-2023-28081","hash":"e6ed9c1a4b02dc219de1648f44cd808a56171b81","repo_url":"https://gi(...TRUNCATED) |
End of preview.