prompt stringclasses 1
value | completions listlengths 1 63.8k | labels listlengths 1 63.8k | source stringclasses 1
value | other_info stringlengths 2.06k 101k | index int64 0 6.83k |
|---|---|---|---|---|---|
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/*\n * This file is part of the Kimai time-tracking app.\n *\n * For the full copyright and license information, please view the LICENSE\n * file that was distributed with this source code.\n */",
"namespace App\\Tests\\Controller;",
"use App\\DataFixtures\\UserFixtures;\nuse App\\Entity\\Configurat... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [25, 429, 89, 616, 106, 201, 43, 77, 38, 45, 94, 55, 37, 65, 51, 48, 31, 165, 10, 10, 10, 10, 427, 36, 226, 215, 732, 452, 32, 56, 56, 56, 56, 56, 56, 794, 794], "buggy_code_start_loc": [20, 424, 24, 214, 23, 30, 42, 76, 37, 25, 40, 36, 26, 25, 28, 47, 31, 161, 9, 9, 9, 9, 427, 36, 219, 209, 711,... | 211 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/*\n * This file is part of the Kimai time-tracking app.\n *\n * For the full copyright and license information, please view the LICENSE\n * file that was distributed with this source code.\n */",
"namespace App\\Tests\\Controller;",
"use App\\DataFixtures\\UserFixtures;\nuse App\\Entity\\Configurat... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [25, 429, 89, 616, 106, 201, 43, 77, 38, 45, 94, 55, 37, 65, 51, 48, 31, 165, 10, 10, 10, 10, 427, 36, 226, 215, 732, 452, 32, 56, 56, 56, 56, 56, 56, 794, 794], "buggy_code_start_loc": [20, 424, 24, 214, 23, 30, 42, 76, 37, 25, 40, 36, 26, 25, 28, 47, 31, 161, 9, 9, 9, 9, 427, 36, 219, 209, 711,... | 211 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/*\n * This file is part of the Kimai time-tracking app.\n *\n * For the full copyright and license information, please view the LICENSE\n * file that was distributed with this source code.\n */",
"namespace App\\Tests\\Controller;",
"use App\\Entity\\User;",
"/**\n * @group integration\n */\nclas... | [
1,
1,
1,
1,
1,
1,
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [25, 429, 89, 616, 106, 201, 43, 77, 38, 45, 94, 55, 37, 65, 51, 48, 31, 165, 10, 10, 10, 10, 427, 36, 226, 215, 732, 452, 32, 56, 56, 56, 56, 56, 56, 794, 794], "buggy_code_start_loc": [20, 424, 24, 214, 23, 30, 42, 76, 37, 25, 40, 36, 26, 25, 28, 47, 31, 161, 9, 9, 9, 9, 427, 36, 219, 209, 711,... | 211 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/*\n * This file is part of the Kimai time-tracking app.\n *\n * For the full copyright and license information, please view the LICENSE\n * file that was distributed with this source code.\n */",
"namespace App\\Tests\\Controller;",
"use App\\Entity\\User;",
"/**\n * @group integration\n */\nclas... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [25, 429, 89, 616, 106, 201, 43, 77, 38, 45, 94, 55, 37, 65, 51, 48, 31, 165, 10, 10, 10, 10, 427, 36, 226, 215, 732, 452, 32, 56, 56, 56, 56, 56, 56, 794, 794], "buggy_code_start_loc": [20, 424, 24, 214, 23, 30, 42, 76, 37, 25, 40, 36, 26, 25, 28, 47, 31, 161, 9, 9, 9, 9, 427, 36, 219, 209, 711,... | 211 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/*\n * This file is part of the Kimai time-tracking app.\n *\n * For the full copyright and license information, please view the LICENSE\n * file that was distributed with this source code.\n */",
"namespace App\\Tests\\Controller;",
"use App\\Entity\\Activity;\nuse App\\Entity\\ActivityMeta;\nuse A... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [25, 429, 89, 616, 106, 201, 43, 77, 38, 45, 94, 55, 37, 65, 51, 48, 31, 165, 10, 10, 10, 10, 427, 36, 226, 215, 732, 452, 32, 56, 56, 56, 56, 56, 56, 794, 794], "buggy_code_start_loc": [20, 424, 24, 214, 23, 30, 42, 76, 37, 25, 40, 36, 26, 25, 28, 47, 31, 161, 9, 9, 9, 9, 427, 36, 219, 209, 711,... | 211 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/*\n * This file is part of the Kimai time-tracking app.\n *\n * For the full copyright and license information, please view the LICENSE\n * file that was distributed with this source code.\n */",
"namespace App\\Tests\\Controller;",
"use App\\Entity\\Activity;\nuse App\\Entity\\ActivityMeta;\nuse A... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [25, 429, 89, 616, 106, 201, 43, 77, 38, 45, 94, 55, 37, 65, 51, 48, 31, 165, 10, 10, 10, 10, 427, 36, 226, 215, 732, 452, 32, 56, 56, 56, 56, 56, 56, 794, 794], "buggy_code_start_loc": [20, 424, 24, 214, 23, 30, 42, 76, 37, 25, 40, 36, 26, 25, 28, 47, 31, 161, 9, 9, 9, 9, 427, 36, 219, 209, 711,... | 211 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/*\n * This file is part of the Kimai time-tracking app.\n *\n * For the full copyright and license information, please view the LICENSE\n * file that was distributed with this source code.\n */",
"namespace App\\Tests\\Controller;",
"use App\\Entity\\Team;\nuse App\\Entity\\User;\nuse App\\Tests\\D... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [25, 429, 89, 616, 106, 201, 43, 77, 38, 45, 94, 55, 37, 65, 51, 48, 31, 165, 10, 10, 10, 10, 427, 36, 226, 215, 732, 452, 32, 56, 56, 56, 56, 56, 56, 794, 794], "buggy_code_start_loc": [20, 424, 24, 214, 23, 30, 42, 76, 37, 25, 40, 36, 26, 25, 28, 47, 31, 161, 9, 9, 9, 9, 427, 36, 219, 209, 711,... | 211 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/*\n * This file is part of the Kimai time-tracking app.\n *\n * For the full copyright and license information, please view the LICENSE\n * file that was distributed with this source code.\n */",
"namespace App\\Tests\\Controller;",
"use App\\Entity\\Team;\nuse App\\Entity\\User;\nuse App\\Tests\\D... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [25, 429, 89, 616, 106, 201, 43, 77, 38, 45, 94, 55, 37, 65, 51, 48, 31, 165, 10, 10, 10, 10, 427, 36, 226, 215, 732, 452, 32, 56, 56, 56, 56, 56, 56, 794, 794], "buggy_code_start_loc": [20, 424, 24, 214, 23, 30, 42, 76, 37, 25, 40, 36, 26, 25, 28, 47, 31, 161, 9, 9, 9, 9, 427, 36, 219, 209, 711,... | 211 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/*\n * This file is part of the Kimai time-tracking app.\n *\n * For the full copyright and license information, please view the LICENSE\n * file that was distributed with this source code.\n */",
"namespace App\\Tests\\Controller;",
"use App\\Entity\\Activity;\nuse App\\Entity\\Configuration;\nuse ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [25, 429, 89, 616, 106, 201, 43, 77, 38, 45, 94, 55, 37, 65, 51, 48, 31, 165, 10, 10, 10, 10, 427, 36, 226, 215, 732, 452, 32, 56, 56, 56, 56, 56, 56, 794, 794], "buggy_code_start_loc": [20, 424, 24, 214, 23, 30, 42, 76, 37, 25, 40, 36, 26, 25, 28, 47, 31, 161, 9, 9, 9, 9, 427, 36, 219, 209, 711,... | 211 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/*\n * This file is part of the Kimai time-tracking app.\n *\n * For the full copyright and license information, please view the LICENSE\n * file that was distributed with this source code.\n */",
"namespace App\\Tests\\Controller;",
"use App\\Entity\\Activity;\nuse App\\Entity\\Configuration;\nuse ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [25, 429, 89, 616, 106, 201, 43, 77, 38, 45, 94, 55, 37, 65, 51, 48, 31, 165, 10, 10, 10, 10, 427, 36, 226, 215, 732, 452, 32, 56, 56, 56, 56, 56, 56, 794, 794], "buggy_code_start_loc": [20, 424, 24, 214, 23, 30, 42, 76, 37, 25, 40, 36, 26, 25, 28, 47, 31, 161, 9, 9, 9, 9, 427, 36, 219, 209, 711,... | 211 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/*\n * This file is part of the Kimai time-tracking app.\n *\n * For the full copyright and license information, please view the LICENSE\n * file that was distributed with this source code.\n */",
"namespace App\\Tests\\Controller;",
"use App\\Entity\\Timesheet;\nuse App\\Entity\\TimesheetMeta;\nuse... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [25, 429, 89, 616, 106, 201, 43, 77, 38, 45, 94, 55, 37, 65, 51, 48, 31, 165, 10, 10, 10, 10, 427, 36, 226, 215, 732, 452, 32, 56, 56, 56, 56, 56, 56, 794, 794], "buggy_code_start_loc": [20, 424, 24, 214, 23, 30, 42, 76, 37, 25, 40, 36, 26, 25, 28, 47, 31, 161, 9, 9, 9, 9, 427, 36, 219, 209, 711,... | 211 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/*\n * This file is part of the Kimai time-tracking app.\n *\n * For the full copyright and license information, please view the LICENSE\n * file that was distributed with this source code.\n */",
"namespace App\\Tests\\Controller;",
"use App\\Entity\\Timesheet;\nuse App\\Entity\\TimesheetMeta;\nuse... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [25, 429, 89, 616, 106, 201, 43, 77, 38, 45, 94, 55, 37, 65, 51, 48, 31, 165, 10, 10, 10, 10, 427, 36, 226, 215, 732, 452, 32, 56, 56, 56, 56, 56, 56, 794, 794], "buggy_code_start_loc": [20, 424, 24, 214, 23, 30, 42, 76, 37, 25, 40, 36, 26, 25, 28, 47, 31, 161, 9, 9, 9, 9, 427, 36, 219, 209, 711,... | 211 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?xml version=\"1.0\" encoding=\"utf-8\"?>",
"<xliff xmlns=\"urn:oasis:names:tc:xliff:document:1.2\" version=\"1.2\">\n <file source-language=\"en\" target-language=\"ja\" datatype=\"plaintext\" original=\"about.en.xlf\">\n <body>\n <trans-unit id=\"3Clo55j\" resname=\"about.title\">\n <source>ab... | [
0,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [25, 429, 89, 616, 106, 201, 43, 77, 38, 45, 94, 55, 37, 65, 51, 48, 31, 165, 10, 10, 10, 10, 427, 36, 226, 215, 732, 452, 32, 56, 56, 56, 56, 56, 56, 794, 794], "buggy_code_start_loc": [20, 424, 24, 214, 23, 30, 42, 76, 37, 25, 40, 36, 26, 25, 28, 47, 31, 161, 9, 9, 9, 9, 427, 36, 219, 209, 711,... | 211 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?xml version=\"1.0\" encoding=\"UTF-8\"?>",
"<xliff xmlns=\"urn:oasis:names:tc:xliff:document:1.2\" version=\"1.2\">\n <file source-language=\"en\" target-language=\"ja\" datatype=\"plaintext\" original=\"about.en.xlf\">\n <body>\n <trans-unit id=\"3Clo55j\" resname=\"about.title\">\n <source>ab... | [
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [25, 429, 89, 616, 106, 201, 43, 77, 38, 45, 94, 55, 37, 65, 51, 48, 31, 165, 10, 10, 10, 10, 427, 36, 226, 215, 732, 452, 32, 56, 56, 56, 56, 56, 56, 794, 794], "buggy_code_start_loc": [20, 424, 24, 214, 23, 30, 42, 76, 37, 25, 40, 36, 26, 25, 28, 47, 31, 161, 9, 9, 9, 9, 427, 36, 219, 209, 711,... | 211 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?xml version=\"1.0\" encoding=\"utf-8\"?>",
"<xliff xmlns=\"urn:oasis:names:tc:xliff:document:1.2\" version=\"1.2\">\n <file source-language=\"en\" target-language=\"el\" datatype=\"plaintext\" original=\"flashmessages.en.xlf\">\n <body>\n <trans-unit id=\"S9k1S7Z\" resname=\"warning\">\n <sourc... | [
0,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [25, 429, 89, 616, 106, 201, 43, 77, 38, 45, 94, 55, 37, 65, 51, 48, 31, 165, 10, 10, 10, 10, 427, 36, 226, 215, 732, 452, 32, 56, 56, 56, 56, 56, 56, 794, 794], "buggy_code_start_loc": [20, 424, 24, 214, 23, 30, 42, 76, 37, 25, 40, 36, 26, 25, 28, 47, 31, 161, 9, 9, 9, 9, 427, 36, 219, 209, 711,... | 211 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?xml version=\"1.0\" encoding=\"UTF-8\"?>",
"<xliff xmlns=\"urn:oasis:names:tc:xliff:document:1.2\" version=\"1.2\">\n <file source-language=\"en\" target-language=\"el\" datatype=\"plaintext\" original=\"flashmessages.en.xlf\">\n <body>\n <trans-unit id=\"S9k1S7Z\" resname=\"warning\">\n <sourc... | [
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [25, 429, 89, 616, 106, 201, 43, 77, 38, 45, 94, 55, 37, 65, 51, 48, 31, 165, 10, 10, 10, 10, 427, 36, 226, 215, 732, 452, 32, 56, 56, 56, 56, 56, 56, 794, 794], "buggy_code_start_loc": [20, 424, 24, 214, 23, 30, 42, 76, 37, 25, 40, 36, 26, 25, 28, 47, 31, 161, 9, 9, 9, 9, 427, 36, 219, 209, 711,... | 211 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<xliff xmlns=\"urn:oasis:names:tc:xliff:document:1.2\" version=\"1.2\">\n <file source-language=\"en\" target-language=\"fr\" datatype=\"plaintext\" original=\"flashmessages.en.xlf\">\n <body>\n <trans-unit id=\"S9k1S7Z\" resname=\"warning\">\n <source>wa... | [
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [25, 429, 89, 616, 106, 201, 43, 77, 38, 45, 94, 55, 37, 65, 51, 48, 31, 165, 10, 10, 10, 10, 427, 36, 226, 215, 732, 452, 32, 56, 56, 56, 56, 56, 56, 794, 794], "buggy_code_start_loc": [20, 424, 24, 214, 23, 30, 42, 76, 37, 25, 40, 36, 26, 25, 28, 47, 31, 161, 9, 9, 9, 9, 427, 36, 219, 209, 711,... | 211 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<xliff xmlns=\"urn:oasis:names:tc:xliff:document:1.2\" version=\"1.2\">\n <file source-language=\"en\" target-language=\"fr\" datatype=\"plaintext\" original=\"flashmessages.en.xlf\">\n <body>\n <trans-unit id=\"S9k1S7Z\" resname=\"warning\">\n <source>wa... | [
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [25, 429, 89, 616, 106, 201, 43, 77, 38, 45, 94, 55, 37, 65, 51, 48, 31, 165, 10, 10, 10, 10, 427, 36, 226, 215, 732, 452, 32, 56, 56, 56, 56, 56, 56, 794, 794], "buggy_code_start_loc": [20, 424, 24, 214, 23, 30, 42, 76, 37, 25, 40, 36, 26, 25, 28, 47, 31, 161, 9, 9, 9, 9, 427, 36, 219, 209, 711,... | 211 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<xliff xmlns=\"urn:oasis:names:tc:xliff:document:1.2\" version=\"1.2\">\n <file source-language=\"en\" target-language=\"he\" datatype=\"plaintext\" original=\"flashmessages.en.xlf\">\n <body>\n <trans-unit id=\"S9k1S7Z\" resname=\"warning\">\n <source>wa... | [
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [25, 429, 89, 616, 106, 201, 43, 77, 38, 45, 94, 55, 37, 65, 51, 48, 31, 165, 10, 10, 10, 10, 427, 36, 226, 215, 732, 452, 32, 56, 56, 56, 56, 56, 56, 794, 794], "buggy_code_start_loc": [20, 424, 24, 214, 23, 30, 42, 76, 37, 25, 40, 36, 26, 25, 28, 47, 31, 161, 9, 9, 9, 9, 427, 36, 219, 209, 711,... | 211 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<xliff xmlns=\"urn:oasis:names:tc:xliff:document:1.2\" version=\"1.2\">\n <file source-language=\"en\" target-language=\"he\" datatype=\"plaintext\" original=\"flashmessages.en.xlf\">\n <body>\n <trans-unit id=\"S9k1S7Z\" resname=\"warning\">\n <source>wa... | [
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [25, 429, 89, 616, 106, 201, 43, 77, 38, 45, 94, 55, 37, 65, 51, 48, 31, 165, 10, 10, 10, 10, 427, 36, 226, 215, 732, 452, 32, 56, 56, 56, 56, 56, 56, 794, 794], "buggy_code_start_loc": [20, 424, 24, 214, 23, 30, 42, 76, 37, 25, 40, 36, 26, 25, 28, 47, 31, 161, 9, 9, 9, 9, 427, 36, 219, 209, 711,... | 211 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<xliff xmlns=\"urn:oasis:names:tc:xliff:document:1.2\" version=\"1.2\">\n <file source-language=\"en\" target-language=\"pt\" datatype=\"plaintext\" original=\"flashmessages.en.xlf\">\n <body>\n <trans-unit id=\"S9k1S7Z\" resname=\"warning\">\n <source>wa... | [
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [25, 429, 89, 616, 106, 201, 43, 77, 38, 45, 94, 55, 37, 65, 51, 48, 31, 165, 10, 10, 10, 10, 427, 36, 226, 215, 732, 452, 32, 56, 56, 56, 56, 56, 56, 794, 794], "buggy_code_start_loc": [20, 424, 24, 214, 23, 30, 42, 76, 37, 25, 40, 36, 26, 25, 28, 47, 31, 161, 9, 9, 9, 9, 427, 36, 219, 209, 711,... | 211 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<xliff xmlns=\"urn:oasis:names:tc:xliff:document:1.2\" version=\"1.2\">\n <file source-language=\"en\" target-language=\"pt\" datatype=\"plaintext\" original=\"flashmessages.en.xlf\">\n <body>\n <trans-unit id=\"S9k1S7Z\" resname=\"warning\">\n <source>wa... | [
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [25, 429, 89, 616, 106, 201, 43, 77, 38, 45, 94, 55, 37, 65, 51, 48, 31, 165, 10, 10, 10, 10, 427, 36, 226, 215, 732, 452, 32, 56, 56, 56, 56, 56, 56, 794, 794], "buggy_code_start_loc": [20, 424, 24, 214, 23, 30, 42, 76, 37, 25, 40, 36, 26, 25, 28, 47, 31, 161, 9, 9, 9, 9, 427, 36, 219, 209, 711,... | 211 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<xliff xmlns=\"urn:oasis:names:tc:xliff:document:1.2\" version=\"1.2\">\n <file source-language=\"en\" target-language=\"pt-BR\" datatype=\"plaintext\" original=\"flashmessages.en.xlf\">\n <body>\n <trans-unit id=\"S9k1S7Z\" resname=\"warning\">\n <source... | [
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [25, 429, 89, 616, 106, 201, 43, 77, 38, 45, 94, 55, 37, 65, 51, 48, 31, 165, 10, 10, 10, 10, 427, 36, 226, 215, 732, 452, 32, 56, 56, 56, 56, 56, 56, 794, 794], "buggy_code_start_loc": [20, 424, 24, 214, 23, 30, 42, 76, 37, 25, 40, 36, 26, 25, 28, 47, 31, 161, 9, 9, 9, 9, 427, 36, 219, 209, 711,... | 211 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<xliff xmlns=\"urn:oasis:names:tc:xliff:document:1.2\" version=\"1.2\">\n <file source-language=\"en\" target-language=\"pt-BR\" datatype=\"plaintext\" original=\"flashmessages.en.xlf\">\n <body>\n <trans-unit id=\"S9k1S7Z\" resname=\"warning\">\n <source... | [
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [25, 429, 89, 616, 106, 201, 43, 77, 38, 45, 94, 55, 37, 65, 51, 48, 31, 165, 10, 10, 10, 10, 427, 36, 226, 215, 732, 452, 32, 56, 56, 56, 56, 56, 56, 794, 794], "buggy_code_start_loc": [20, 424, 24, 214, 23, 30, 42, 76, 37, 25, 40, 36, 26, 25, 28, 47, 31, 161, 9, 9, 9, 9, 427, 36, 219, 209, 711,... | 211 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<xliff xmlns=\"urn:oasis:names:tc:xliff:document:1.2\" version=\"1.2\">\n <file source-language=\"en\" target-language=\"tr\" datatype=\"plaintext\" original=\"flashmessages.en.xlf\">\n <body>\n <trans-unit id=\"S9k1S7Z\" resname=\"warning\">\n <source>wa... | [
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [25, 429, 89, 616, 106, 201, 43, 77, 38, 45, 94, 55, 37, 65, 51, 48, 31, 165, 10, 10, 10, 10, 427, 36, 226, 215, 732, 452, 32, 56, 56, 56, 56, 56, 56, 794, 794], "buggy_code_start_loc": [20, 424, 24, 214, 23, 30, 42, 76, 37, 25, 40, 36, 26, 25, 28, 47, 31, 161, 9, 9, 9, 9, 427, 36, 219, 209, 711,... | 211 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<xliff xmlns=\"urn:oasis:names:tc:xliff:document:1.2\" version=\"1.2\">\n <file source-language=\"en\" target-language=\"tr\" datatype=\"plaintext\" original=\"flashmessages.en.xlf\">\n <body>\n <trans-unit id=\"S9k1S7Z\" resname=\"warning\">\n <source>wa... | [
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [25, 429, 89, 616, 106, 201, 43, 77, 38, 45, 94, 55, 37, 65, 51, 48, 31, 165, 10, 10, 10, 10, 427, 36, 226, 215, 732, 452, 32, 56, 56, 56, 56, 56, 56, 794, 794], "buggy_code_start_loc": [20, 424, 24, 214, 23, 30, 42, 76, 37, 25, 40, 36, 26, 25, 28, 47, 31, 161, 9, 9, 9, 9, 427, 36, 219, 209, 711,... | 211 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<xliff xmlns=\"urn:oasis:names:tc:xliff:document:1.2\" version=\"1.2\">\n <file source-language=\"en\" target-language=\"de\" datatype=\"plaintext\" original=\"messages.en.xlf\">\n <body>\n <!--\n Global template keys\n -->\n <trans-... | [
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [25, 429, 89, 616, 106, 201, 43, 77, 38, 45, 94, 55, 37, 65, 51, 48, 31, 165, 10, 10, 10, 10, 427, 36, 226, 215, 732, 452, 32, 56, 56, 56, 56, 56, 56, 794, 794], "buggy_code_start_loc": [20, 424, 24, 214, 23, 30, 42, 76, 37, 25, 40, 36, 26, 25, 28, 47, 31, 161, 9, 9, 9, 9, 427, 36, 219, 209, 711,... | 211 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<xliff xmlns=\"urn:oasis:names:tc:xliff:document:1.2\" version=\"1.2\">\n <file source-language=\"en\" target-language=\"de\" datatype=\"plaintext\" original=\"messages.en.xlf\">\n <body>\n <!--\n Global template keys\n -->\n <trans-... | [
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [25, 429, 89, 616, 106, 201, 43, 77, 38, 45, 94, 55, 37, 65, 51, 48, 31, 165, 10, 10, 10, 10, 427, 36, 226, 215, 732, 452, 32, 56, 56, 56, 56, 56, 56, 794, 794], "buggy_code_start_loc": [20, 424, 24, 214, 23, 30, 42, 76, 37, 25, 40, 36, 26, 25, 28, 47, 31, 161, 9, 9, 9, 9, 427, 36, 219, 209, 711,... | 211 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?xml version=\"1.0\" encoding=\"utf-8\"?>\n<xliff xmlns=\"urn:oasis:names:tc:xliff:document:1.2\" version=\"1.2\">\n <file source-language=\"en\" target-language=\"en\" datatype=\"plaintext\" original=\"messages.en.xlf\">\n <body>\n <!--\n Global template keys\n -->\n <trans-... | [
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [25, 429, 89, 616, 106, 201, 43, 77, 38, 45, 94, 55, 37, 65, 51, 48, 31, 165, 10, 10, 10, 10, 427, 36, 226, 215, 732, 452, 32, 56, 56, 56, 56, 56, 56, 794, 794], "buggy_code_start_loc": [20, 424, 24, 214, 23, 30, 42, 76, 37, 25, 40, 36, 26, 25, 28, 47, 31, 161, 9, 9, 9, 9, 427, 36, 219, 209, 711,... | 211 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?xml version=\"1.0\" encoding=\"utf-8\"?>\n<xliff xmlns=\"urn:oasis:names:tc:xliff:document:1.2\" version=\"1.2\">\n <file source-language=\"en\" target-language=\"en\" datatype=\"plaintext\" original=\"messages.en.xlf\">\n <body>\n <!--\n Global template keys\n -->\n <trans-... | [
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [25, 429, 89, 616, 106, 201, 43, 77, 38, 45, 94, 55, 37, 65, 51, 48, 31, 165, 10, 10, 10, 10, 427, 36, 226, 215, 732, 452, 32, 56, 56, 56, 56, 56, 56, 794, 794], "buggy_code_start_loc": [20, 424, 24, 214, 23, 30, 42, 76, 37, 25, 40, 36, 26, 25, 28, 47, 31, 161, 9, 9, 9, 9, 427, 36, 219, 209, 711,... | 211 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* radare - LGPL - Copyright 2019-2022 - GustavoLCR */",
"#include \"ne.h\"\n#define NE_BUG 0",
"static char *__get_target_os(r_bin_ne_obj_t *bin) {\n\tswitch (bin->ne_header->targOS) {\n\tcase 1:\n\t\treturn \"OS/2\";\n\tcase 2:\n\t\treturn \"Windows\";\n\tcase 3:\n\t\treturn \"European MS-DOS 4.x\";\n\tcase ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [354], "buggy_code_start_loc": [118], "filenames": ["libr/bin/format/ne/ne.c"], "fixing_code_end_loc": [358], "fixing_code_start_loc": [118], "message": "NULL Pointer Dereference in r_bin_ne_get_entrypoints function in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability allows ... | 212 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* radare - LGPL - Copyright 2019-2022 - GustavoLCR */",
"#include \"ne.h\"\n#define NE_BUG 0",
"static char *__get_target_os(r_bin_ne_obj_t *bin) {\n\tswitch (bin->ne_header->targOS) {\n\tcase 1:\n\t\treturn \"OS/2\";\n\tcase 2:\n\t\treturn \"Windows\";\n\tcase 3:\n\t\treturn \"European MS-DOS 4.x\";\n\tcase ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [354], "buggy_code_start_loc": [118], "filenames": ["libr/bin/format/ne/ne.c"], "fixing_code_end_loc": [358], "fixing_code_start_loc": [118], "message": "NULL Pointer Dereference in r_bin_ne_get_entrypoints function in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability allows ... | 212 |
Determine whether the {function_name} code is vulnerable or not. | [
"# [DEPRECATED] \n# Please use [Appium Inspector](https://github.com/appium/appium-inspector) and the command line version of [Appium](https://github.com/appium/appium) to inspect elements.",
"❗❗ This project is no longer maintained since it is not compatible with Appium 2.0+. For Appium 1.x and 2.0+, use the com... | [
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [7], "buggy_code_start_loc": [6], "filenames": ["README.md"], "fixing_code_end_loc": [9], "fixing_code_start_loc": [6], "message": "OS Command Injection in GitHub repository appium/appium-desktop prior to v1.22.3-4.", "other": {"cve": {"cisaActionDue": null, "cisaExploitAdd": null, "cisaRequiredA... | 213 |
Determine whether the {function_name} code is vulnerable or not. | [
"# [DEPRECATED] \n# Please use [Appium Inspector](https://github.com/appium/appium-inspector) and the command line version of [Appium](https://github.com/appium/appium) to inspect elements.",
"❗❗ This project is no longer maintained since it is not compatible with Appium 2.0+. For Appium 1.x and 2.0+, use the com... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [7], "buggy_code_start_loc": [6], "filenames": ["README.md"], "fixing_code_end_loc": [9], "fixing_code_start_loc": [6], "message": "OS Command Injection in GitHub repository appium/appium-desktop prior to v1.22.3-4.", "other": {"cve": {"cisaActionDue": null, "cisaExploitAdd": null, "cisaRequiredA... | 213 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Monkey's Audio APE demuxer\n * Copyright (c) 2007 Benjamin Zores <ben@geexbox.org>\n * based upon libdemac from Dave Chapman.\n *\n * This file is part of FFmpeg.\n *\n * FFmpeg is free software; you can redistribute it and/or\n * modify it under the terms of the GNU Lesser General Public\n * License as pu... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [244], "buggy_code_start_loc": [244], "filenames": ["libavformat/ape.c"], "fixing_code_end_loc": [249], "fixing_code_start_loc": [245], "message": "The ape_read_header function in ape.c in libavformat in FFmpeg before 0.5.4, as used in MPlayer, VideoLAN VLC media player, and other products, allow... | 214 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Monkey's Audio APE demuxer\n * Copyright (c) 2007 Benjamin Zores <ben@geexbox.org>\n * based upon libdemac from Dave Chapman.\n *\n * This file is part of FFmpeg.\n *\n * FFmpeg is free software; you can redistribute it and/or\n * modify it under the terms of the GNU Lesser General Public\n * License as pu... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [244], "buggy_code_start_loc": [244], "filenames": ["libavformat/ape.c"], "fixing_code_end_loc": [249], "fixing_code_start_loc": [245], "message": "The ape_read_header function in ape.c in libavformat in FFmpeg before 0.5.4, as used in MPlayer, VideoLAN VLC media player, and other products, allow... | 214 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n *\tDCCP over IPv6\n *\tLinux INET6 implementation\n *\n *\tBased on net/dccp6/ipv6.c\n *\n *\tArnaldo Carvalho de Melo <acme@ghostprotocols.net>\n *\n *\tThis program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public License\n * as published by ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [492, 1133], "buggy_code_start_loc": [428, 1064], "filenames": ["net/dccp/ipv6.c", "net/ipv6/tcp_ipv6.c"], "fixing_code_end_loc": [499, 1136], "fixing_code_start_loc": [429, 1065], "message": "The dccp_v6_request_recv_sock function in net/dccp/ipv6.c in the Linux kernel through 4.11.1 mishandles ... | 215 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n *\tDCCP over IPv6\n *\tLinux INET6 implementation\n *\n *\tBased on net/dccp6/ipv6.c\n *\n *\tArnaldo Carvalho de Melo <acme@ghostprotocols.net>\n *\n *\tThis program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public License\n * as published by ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [492, 1133], "buggy_code_start_loc": [428, 1064], "filenames": ["net/dccp/ipv6.c", "net/ipv6/tcp_ipv6.c"], "fixing_code_end_loc": [499, 1136], "fixing_code_start_loc": [429, 1065], "message": "The dccp_v6_request_recv_sock function in net/dccp/ipv6.c in the Linux kernel through 4.11.1 mishandles ... | 215 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n *\tTCP over IPv6\n *\tLinux INET6 implementation\n *\n *\tAuthors:\n *\tPedro Roque\t\t<roque@di.fc.ul.pt>\n *\n *\tBased on:\n *\tlinux/net/ipv4/tcp.c\n *\tlinux/net/ipv4/tcp_input.c\n *\tlinux/net/ipv4/tcp_output.c\n *\n *\tFixes:\n *\tHideaki YOSHIFUJI\t:\tsin6_scope_id support\n *\tYOSHIFUJI Hideaki @USAG... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [492, 1133], "buggy_code_start_loc": [428, 1064], "filenames": ["net/dccp/ipv6.c", "net/ipv6/tcp_ipv6.c"], "fixing_code_end_loc": [499, 1136], "fixing_code_start_loc": [429, 1065], "message": "The dccp_v6_request_recv_sock function in net/dccp/ipv6.c in the Linux kernel through 4.11.1 mishandles ... | 215 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n *\tTCP over IPv6\n *\tLinux INET6 implementation\n *\n *\tAuthors:\n *\tPedro Roque\t\t<roque@di.fc.ul.pt>\n *\n *\tBased on:\n *\tlinux/net/ipv4/tcp.c\n *\tlinux/net/ipv4/tcp_input.c\n *\tlinux/net/ipv4/tcp_output.c\n *\n *\tFixes:\n *\tHideaki YOSHIFUJI\t:\tsin6_scope_id support\n *\tYOSHIFUJI Hideaki @USAG... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [492, 1133], "buggy_code_start_loc": [428, 1064], "filenames": ["net/dccp/ipv6.c", "net/ipv6/tcp_ipv6.c"], "fixing_code_end_loc": [499, 1136], "fixing_code_start_loc": [429, 1065], "message": "The dccp_v6_request_recv_sock function in net/dccp/ipv6.c in the Linux kernel through 4.11.1 mishandles ... | 215 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* Copyright 2018 The TensorFlow Authors. All Rights Reserved.",
"Licensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at",
" http://www.apache.org/licenses/LICENSE-2.0",
"Unless required b... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [306], "buggy_code_start_loc": [306], "filenames": ["tensorflow/core/common_runtime/eager/execute.cc"], "fixing_code_end_loc": [310], "fixing_code_start_loc": [307], "message": "TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, multiple ... | 216 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* Copyright 2018 The TensorFlow Authors. All Rights Reserved.",
"Licensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at",
" http://www.apache.org/licenses/LICENSE-2.0",
"Unless required b... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [306], "buggy_code_start_loc": [306], "filenames": ["tensorflow/core/common_runtime/eager/execute.cc"], "fixing_code_end_loc": [310], "fixing_code_start_loc": [307], "message": "TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, multiple ... | 216 |
Determine whether the {function_name} code is vulnerable or not. | [
"#!/bin/bash\nif [ \"$INITIALIZED\" != defined ]; then",
"",
" now() {\n date +'%s%N'\n }\n start=$(now)\n temp=\"${temp:-/tmp/spelling}\"\n mkdir -p $temp\n export temp\n if [ -n \"$DEBUG\" ]; then\n set -x\n begin_group() {\n echo \"::group::$1\"\n }\n end_group() {\n echo '::e... | [
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [2, 22, 377], "buggy_code_start_loc": [2, 19, 376], "filenames": ["common.sh", "spelling-unknown-word-splitter.pl", "unknown-words.sh"], "fixing_code_end_loc": [8, 22, 398], "fixing_code_start_loc": [3, 19, 376], "message": "check-spelling is a github action which provides CI spell checking. In a... | 217 |
Determine whether the {function_name} code is vulnerable or not. | [
"#!/bin/bash\nif [ \"$INITIALIZED\" != defined ]; then",
" if [ \"$RUNNER_OS\" = \"Windows\" ]; then\n echo \"::error ::Windows isn't currently supported\"\n exit 5\n fi\n",
" now() {\n date +'%s%N'\n }\n start=$(now)\n temp=\"${temp:-/tmp/spelling}\"\n mkdir -p $temp\n export temp\n if [ -n \... | [
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [2, 22, 377], "buggy_code_start_loc": [2, 19, 376], "filenames": ["common.sh", "spelling-unknown-word-splitter.pl", "unknown-words.sh"], "fixing_code_end_loc": [8, 22, 398], "fixing_code_start_loc": [3, 19, 376], "message": "check-spelling is a github action which provides CI spell checking. In a... | 217 |
Determine whether the {function_name} code is vulnerable or not. | [
"#!/bin/sh\n#! -*-perl-*-\neval 'exec perl -x -T -w $0 ${1+\"$@\"}'\n if 0;\n# ~/bin/w\n# Search for potentially misspelled words\n# Output is:\n# misspellled\n# woord (WOORD, Woord, woord, woord's)",
"use File::Basename;\nuse Cwd 'abs_path';\nuse File::Temp qw/ tempfile tempdir /;",
"my $dirname = dirname(abs... | [
1,
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [2, 22, 377], "buggy_code_start_loc": [2, 19, 376], "filenames": ["common.sh", "spelling-unknown-word-splitter.pl", "unknown-words.sh"], "fixing_code_end_loc": [8, 22, 398], "fixing_code_start_loc": [3, 19, 376], "message": "check-spelling is a github action which provides CI spell checking. In a... | 217 |
Determine whether the {function_name} code is vulnerable or not. | [
"#!/bin/sh\n#! -*-perl-*-\neval 'exec perl -x -T -w $0 ${1+\"$@\"}'\n if 0;\n# ~/bin/w\n# Search for potentially misspelled words\n# Output is:\n# misspellled\n# woord (WOORD, Woord, woord, woord's)",
"use File::Basename;\nuse Cwd 'abs_path';\nuse File::Temp qw/ tempfile tempdir /;",
"my $dirname = dirname(abs... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [2, 22, 377], "buggy_code_start_loc": [2, 19, 376], "filenames": ["common.sh", "spelling-unknown-word-splitter.pl", "unknown-words.sh"], "fixing_code_end_loc": [8, 22, 398], "fixing_code_start_loc": [3, 19, 376], "message": "check-spelling is a github action which provides CI spell checking. In a... | 217 |
Determine whether the {function_name} code is vulnerable or not. | [
"#!/bin/bash\n# This CI acceptance test is based on:\n# https://github.com/jsoref/spelling/tree/04648bdc63723e5cdf5cbeaff2225a462807abc8\n# It is conceptually `f` which runs `w` (spelling-unknown-word-splitter)\n# plus `fchurn` which uses `dn` mostly rolled together.\nset -e\nexport spellchecker=${spellchecker:-/ap... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [2, 22, 377], "buggy_code_start_loc": [2, 19, 376], "filenames": ["common.sh", "spelling-unknown-word-splitter.pl", "unknown-words.sh"], "fixing_code_end_loc": [8, 22, 398], "fixing_code_start_loc": [3, 19, 376], "message": "check-spelling is a github action which provides CI spell checking. In a... | 217 |
Determine whether the {function_name} code is vulnerable or not. | [
"#!/bin/bash\n# This CI acceptance test is based on:\n# https://github.com/jsoref/spelling/tree/04648bdc63723e5cdf5cbeaff2225a462807abc8\n# It is conceptually `f` which runs `w` (spelling-unknown-word-splitter)\n# plus `fchurn` which uses `dn` mostly rolled together.\nset -e\nexport spellchecker=${spellchecker:-/ap... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [2, 22, 377], "buggy_code_start_loc": [2, 19, 376], "filenames": ["common.sh", "spelling-unknown-word-splitter.pl", "unknown-words.sh"], "fixing_code_end_loc": [8, 22, 398], "fixing_code_start_loc": [3, 19, 376], "message": "check-spelling is a github action which provides CI spell checking. In a... | 217 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2009-2011, Salvatore Sanfilippo <antirez at gmail dot com>\n * Copyright (c) 2010-2014, Pieter Noordhuis <pcnoordhuis at gmail dot com>\n * Copyright (c) 2015, Matt Stancliff <matt at genges dot com>,\n * Jan-Erik Rediger <janerik at fnordig dot com>\n *\n * All rights rese... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [176, 497], "buggy_code_start_loc": [176, 497], "filenames": ["deps/hiredis/hiredis.c", "deps/hiredis/test.c"], "fixing_code_end_loc": [178, 512], "fixing_code_start_loc": [177, 498], "message": "Redis is an open source, in-memory database that persists on disk. The redis-cli command line tool an... | 218 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2009-2011, Salvatore Sanfilippo <antirez at gmail dot com>\n * Copyright (c) 2010-2014, Pieter Noordhuis <pcnoordhuis at gmail dot com>\n * Copyright (c) 2015, Matt Stancliff <matt at genges dot com>,\n * Jan-Erik Rediger <janerik at fnordig dot com>\n *\n * All rights rese... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [176, 497], "buggy_code_start_loc": [176, 497], "filenames": ["deps/hiredis/hiredis.c", "deps/hiredis/test.c"], "fixing_code_end_loc": [178, 512], "fixing_code_start_loc": [177, 498], "message": "Redis is an open source, in-memory database that persists on disk. The redis-cli command line tool an... | 218 |
Determine whether the {function_name} code is vulnerable or not. | [
"#include \"fmacros.h\"\n#include \"sockcompat.h\"\n#include <stdio.h>\n#include <stdlib.h>\n#include <string.h>\n#ifndef _WIN32\n#include <strings.h>\n#include <sys/time.h>\n#endif\n#include <assert.h>\n#include <signal.h>\n#include <errno.h>\n#include <limits.h>",
"#include \"hiredis.h\"\n#include \"async.h\"\n... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [176, 497], "buggy_code_start_loc": [176, 497], "filenames": ["deps/hiredis/hiredis.c", "deps/hiredis/test.c"], "fixing_code_end_loc": [178, 512], "fixing_code_start_loc": [177, 498], "message": "Redis is an open source, in-memory database that persists on disk. The redis-cli command line tool an... | 218 |
Determine whether the {function_name} code is vulnerable or not. | [
"#include \"fmacros.h\"\n#include \"sockcompat.h\"\n#include <stdio.h>\n#include <stdlib.h>\n#include <string.h>\n#ifndef _WIN32\n#include <strings.h>\n#include <sys/time.h>\n#endif\n#include <assert.h>\n#include <signal.h>\n#include <errno.h>\n#include <limits.h>",
"#include \"hiredis.h\"\n#include \"async.h\"\n... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [176, 497], "buggy_code_start_loc": [176, 497], "filenames": ["deps/hiredis/hiredis.c", "deps/hiredis/test.c"], "fixing_code_end_loc": [178, 512], "fixing_code_start_loc": [177, 498], "message": "Redis is an open source, in-memory database that persists on disk. The redis-cli command line tool an... | 218 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n require_once \"../configuration.php\";\n require_once \"../includes/class.inc.php\";\n newClass();\n //Preset variables\n /**\n * Is register succeeded?\n * @var bool\n */\n $register = False;\n /**\n * Is register username or mail already in use?\n * @var bool\n */\n $in_use = False;\n //Ch... | [
1,
0,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [62], "buggy_code_start_loc": [28], "filenames": ["login/register.php"], "fixing_code_end_loc": [62], "fixing_code_start_loc": [28], "message": "USOC is an open source CMS with a focus on simplicity. In affected versions USOC allows for SQL injection via register.php. In particular usernames, ema... | 219 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n require_once \"../configuration.php\";\n require_once \"../includes/class.inc.php\";\n newClass();\n //Preset variables\n /**\n * Is register succeeded?\n * @var bool\n */\n $register = False;\n /**\n * Is register username or mail already in use?\n * @var bool\n */\n $in_use = False;\n //Ch... | [
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [62], "buggy_code_start_loc": [28], "filenames": ["login/register.php"], "fixing_code_end_loc": [62], "fixing_code_start_loc": [28], "message": "USOC is an open source CMS with a focus on simplicity. In affected versions USOC allows for SQL injection via register.php. In particular usernames, ema... | 219 |
Determine whether the {function_name} code is vulnerable or not. | [
"/**\n * @file\n * IMAP helper functions\n *\n * @authors\n * Copyright (C) 1996-1998,2010,2012-2013 Michael R. Elkins <me@mutt.org>\n * Copyright (C) 1996-1999 Brandon Long <blong@fiction.net>\n * Copyright (C) 1999-2009,2012 Brendan Cully <brendan@kublai.com>\n *\n * @copyright\n * This program is free software: ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [247], "buggy_code_start_loc": [247], "filenames": ["imap/util.c"], "fixing_code_end_loc": [254], "fixing_code_start_loc": [248], "message": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/util.c mishandles \"..\" directory traversal in a mailbox name.", "other"... | 220 |
Determine whether the {function_name} code is vulnerable or not. | [
"/**\n * @file\n * IMAP helper functions\n *\n * @authors\n * Copyright (C) 1996-1998,2010,2012-2013 Michael R. Elkins <me@mutt.org>\n * Copyright (C) 1996-1999 Brandon Long <blong@fiction.net>\n * Copyright (C) 1999-2009,2012 Brendan Cully <brendan@kublai.com>\n *\n * @copyright\n * This program is free software: ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [247], "buggy_code_start_loc": [247], "filenames": ["imap/util.c"], "fixing_code_end_loc": [254], "fixing_code_start_loc": [248], "message": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/util.c mishandles \"..\" directory traversal in a mailbox name.", "other"... | 220 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%\n% %\n% %\n% ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [2060], "buggy_code_start_loc": [2059], "filenames": ["MagickCore/profile.c"], "fixing_code_end_loc": [2060], "fixing_code_start_loc": [2059], "message": "Double free vulnerability in magick/profile.c in ImageMagick allows remote attackers to have unspecified impact via a crafted file.", "other":... | 221 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%\n% %\n% %\n% ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [2060], "buggy_code_start_loc": [2059], "filenames": ["MagickCore/profile.c"], "fixing_code_end_loc": [2060], "fixing_code_start_loc": [2059], "message": "Double free vulnerability in magick/profile.c in ImageMagick allows remote attackers to have unspecified impact via a crafted file.", "other":... | 221 |
Determine whether the {function_name} code is vulnerable or not. | [
"# frozen_string_literal: true\nrequire 'rubygems'",
"##\n# A collection of text-wrangling methods",
"module Gem::Text",
" ##\n # Remove any non-printable characters and make the text suitable for\n # printing.\n def clean_text(text)",
" text.gsub(/[\\u0000-\\u0008\\u000b-\\u000c\\u000e-\\u001F\\u007... | [
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [14, 137, 41], "buggy_code_start_loc": [13, 135, 40], "filenames": ["lib/rubygems/text.rb", "test/rubygems/test_gem_commands_query_command.rb", "test/rubygems/test_gem_text.rb"], "fixing_code_end_loc": [14, 137, 41], "fixing_code_start_loc": [13, 135, 40], "message": "RubyGems version 2.6.12 and ... | 222 |
Determine whether the {function_name} code is vulnerable or not. | [
"# frozen_string_literal: true\nrequire 'rubygems'",
"##\n# A collection of text-wrangling methods",
"module Gem::Text",
" ##\n # Remove any non-printable characters and make the text suitable for\n # printing.\n def clean_text(text)",
" text.gsub(/[\\000-\\b\\v-\\f\\016-\\037\\177]/, \".\".freeze)",... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [14, 137, 41], "buggy_code_start_loc": [13, 135, 40], "filenames": ["lib/rubygems/text.rb", "test/rubygems/test_gem_commands_query_command.rb", "test/rubygems/test_gem_text.rb"], "fixing_code_end_loc": [14, 137, 41], "fixing_code_start_loc": [13, 135, 40], "message": "RubyGems version 2.6.12 and ... | 222 |
Determine whether the {function_name} code is vulnerable or not. | [
"# frozen_string_literal: true\nrequire 'rubygems/test_case'\nrequire 'rubygems/commands/query_command'",
"module TestGemCommandsQueryCommandSetup\n def setup\n super",
" @cmd = Gem::Commands::QueryCommand.new",
" @specs = add_gems_to_fetcher",
" @fetcher.data[\"#{@gem_repo}Marshal.#{Gem.marsha... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [14, 137, 41], "buggy_code_start_loc": [13, 135, 40], "filenames": ["lib/rubygems/text.rb", "test/rubygems/test_gem_commands_query_command.rb", "test/rubygems/test_gem_text.rb"], "fixing_code_end_loc": [14, 137, 41], "fixing_code_start_loc": [13, 135, 40], "message": "RubyGems version 2.6.12 and ... | 222 |
Determine whether the {function_name} code is vulnerable or not. | [
"# frozen_string_literal: true\nrequire 'rubygems/test_case'\nrequire 'rubygems/commands/query_command'",
"module TestGemCommandsQueryCommandSetup\n def setup\n super",
" @cmd = Gem::Commands::QueryCommand.new",
" @specs = add_gems_to_fetcher",
" @fetcher.data[\"#{@gem_repo}Marshal.#{Gem.marsha... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [14, 137, 41], "buggy_code_start_loc": [13, 135, 40], "filenames": ["lib/rubygems/text.rb", "test/rubygems/test_gem_commands_query_command.rb", "test/rubygems/test_gem_text.rb"], "fixing_code_end_loc": [14, 137, 41], "fixing_code_start_loc": [13, 135, 40], "message": "RubyGems version 2.6.12 and ... | 222 |
Determine whether the {function_name} code is vulnerable or not. | [
"# frozen_string_literal: true\nrequire 'rubygems/test_case'\nrequire \"rubygems/text\"",
"class TestGemText < Gem::TestCase\n include Gem::Text",
" def test_format_text\n assert_equal \"text to\\nwrap\", format_text(\"text to wrap\", 8)\n end",
" def test_format_text_indent\n assert_equal \" t... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [14, 137, 41], "buggy_code_start_loc": [13, 135, 40], "filenames": ["lib/rubygems/text.rb", "test/rubygems/test_gem_commands_query_command.rb", "test/rubygems/test_gem_text.rb"], "fixing_code_end_loc": [14, 137, 41], "fixing_code_start_loc": [13, 135, 40], "message": "RubyGems version 2.6.12 and ... | 222 |
Determine whether the {function_name} code is vulnerable or not. | [
"# frozen_string_literal: true\nrequire 'rubygems/test_case'\nrequire \"rubygems/text\"",
"class TestGemText < Gem::TestCase\n include Gem::Text",
" def test_format_text\n assert_equal \"text to\\nwrap\", format_text(\"text to wrap\", 8)\n end",
" def test_format_text_indent\n assert_equal \" t... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [14, 137, 41], "buggy_code_start_loc": [13, 135, 40], "filenames": ["lib/rubygems/text.rb", "test/rubygems/test_gem_commands_query_command.rb", "test/rubygems/test_gem_text.rb"], "fixing_code_end_loc": [14, 137, 41], "fixing_code_start_loc": [13, 135, 40], "message": "RubyGems version 2.6.12 and ... | 222 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n *\t\t\tGPAC - Multimedia Framework C SDK\n *\n *\t\t\tAuthors: Jean Le Feuvre\n *\t\t\tCopyright (c) Telecom ParisTech 2005-2012\n *\n * This file is part of GPAC / MPEG2-TS sub-project\n *\n * GPAC is free software; you can redistribute it and/or modify\n * it under the terms of the GNU Lesser General Pub... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1176], "buggy_code_start_loc": [1155], "filenames": ["src/media_tools/mpegts.c"], "fixing_code_end_loc": [1184], "fixing_code_start_loc": [1155], "message": "An issue was discovered in libgpac.a in GPAC before 0.8.0, as demonstrated by MP4Box. It contains a Use-After-Free vulnerability in gf_m2t... | 223 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n *\t\t\tGPAC - Multimedia Framework C SDK\n *\n *\t\t\tAuthors: Jean Le Feuvre\n *\t\t\tCopyright (c) Telecom ParisTech 2005-2012\n *\n * This file is part of GPAC / MPEG2-TS sub-project\n *\n * GPAC is free software; you can redistribute it and/or modify\n * it under the terms of the GNU Lesser General Pub... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1176], "buggy_code_start_loc": [1155], "filenames": ["src/media_tools/mpegts.c"], "fixing_code_end_loc": [1184], "fixing_code_start_loc": [1155], "message": "An issue was discovered in libgpac.a in GPAC before 0.8.0, as demonstrated by MP4Box. It contains a Use-After-Free vulnerability in gf_m2t... | 223 |
Determine whether the {function_name} code is vulnerable or not. | [
"## [Unreleased]",
"",
"\n## 1.11.0 - 2020-03-13\n### Added",
"*Nothing has been added for this version*",
"### Removed\n- MiddlewareMixin\n- Python 3.4 support\n- Django 2.1 support\n- `mock` dependency",
"### Changed\n- `extra_requires` are now listed in lowercase. This is to workaround a bug in `pip`.\... | [
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [1, 75, 334, 193, 166], "buggy_code_start_loc": [1, 75, 0, 4, 2], "filenames": ["CHANGELOG.md", "docs/configuration.rst", "tests/test_views_login.py", "two_factor/views/core.py", "two_factor/views/utils.py"], "fixing_code_end_loc": [10, 83, 414, 264, 197], "fixing_code_start_loc": [2, 76, 1, 5, 3... | 224 |
Determine whether the {function_name} code is vulnerable or not. | [
"## [Unreleased]",
"### Added\n- It is possible to set a timeout between a user authenticiating in the LoginView and them needing to re-authenticate. By default this is 10 minutes.",
"### Removed\n- The final step in the LoginView no longer re-validates a user's credentials",
"### Changed\n- Security Fix: Log... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [1, 75, 334, 193, 166], "buggy_code_start_loc": [1, 75, 0, 4, 2], "filenames": ["CHANGELOG.md", "docs/configuration.rst", "tests/test_views_login.py", "two_factor/views/core.py", "two_factor/views/utils.py"], "fixing_code_end_loc": [10, 83, 414, 264, 197], "fixing_code_start_loc": [2, 76, 1, 5, 3... | 224 |
Determine whether the {function_name} code is vulnerable or not. | [
"Configuration\n=============",
"General Settings\n----------------",
"``TWO_FACTOR_PATCH_ADMIN`` (default: ``True``)\n Whether the Django admin is patched to use the default login view.",
" .. warning::\n The admin currently does not enforce one-time passwords being set for\n admin users.",
"``TW... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [1, 75, 334, 193, 166], "buggy_code_start_loc": [1, 75, 0, 4, 2], "filenames": ["CHANGELOG.md", "docs/configuration.rst", "tests/test_views_login.py", "two_factor/views/core.py", "two_factor/views/utils.py"], "fixing_code_end_loc": [10, 83, 414, 264, 197], "fixing_code_start_loc": [2, 76, 1, 5, 3... | 224 |
Determine whether the {function_name} code is vulnerable or not. | [
"Configuration\n=============",
"General Settings\n----------------",
"``TWO_FACTOR_PATCH_ADMIN`` (default: ``True``)\n Whether the Django admin is patched to use the default login view.",
" .. warning::\n The admin currently does not enforce one-time passwords being set for\n admin users.",
"``TW... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [1, 75, 334, 193, 166], "buggy_code_start_loc": [1, 75, 0, 4, 2], "filenames": ["CHANGELOG.md", "docs/configuration.rst", "tests/test_views_login.py", "two_factor/views/core.py", "two_factor/views/utils.py"], "fixing_code_end_loc": [10, 83, 414, 264, 197], "fixing_code_start_loc": [2, 76, 1, 5, 3... | 224 |
Determine whether the {function_name} code is vulnerable or not. | [
"",
"from unittest import mock",
"from django.conf import settings\nfrom django.shortcuts import resolve_url\nfrom django.test import TestCase\nfrom django.test.utils import override_settings\nfrom django.urls import reverse\nfrom django_otp import DEVICE_ID_SESSION_KEY\nfrom django_otp.oath import totp",
"fr... | [
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
0,
0,
0,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1, 75, 334, 193, 166], "buggy_code_start_loc": [1, 75, 0, 4, 2], "filenames": ["CHANGELOG.md", "docs/configuration.rst", "tests/test_views_login.py", "two_factor/views/core.py", "two_factor/views/utils.py"], "fixing_code_end_loc": [10, 83, 414, 264, 197], "fixing_code_start_loc": [2, 76, 1, 5, 3... | 224 |
Determine whether the {function_name} code is vulnerable or not. | [
"import json",
"from unittest import mock",
"from django.conf import settings\nfrom django.shortcuts import resolve_url\nfrom django.test import TestCase\nfrom django.test.utils import override_settings\nfrom django.urls import reverse\nfrom django_otp import DEVICE_ID_SESSION_KEY\nfrom django_otp.oath import t... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1, 75, 334, 193, 166], "buggy_code_start_loc": [1, 75, 0, 4, 2], "filenames": ["CHANGELOG.md", "docs/configuration.rst", "tests/test_views_login.py", "two_factor/views/core.py", "two_factor/views/utils.py"], "fixing_code_end_loc": [10, 83, 414, 264, 197], "fixing_code_start_loc": [2, 76, 1, 5, 3... | 224 |
Determine whether the {function_name} code is vulnerable or not. | [
"import logging\nimport warnings\nfrom base64 import b32encode\nfrom binascii import unhexlify",
"",
"\nimport django_otp\nimport qrcode\nimport qrcode.image.svg\nfrom django.conf import settings\nfrom django.contrib.auth import REDIRECT_FIELD_NAME, login\nfrom django.contrib.auth.decorators import login_requir... | [
1,
0,
1,
0,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
0,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1, 75, 334, 193, 166], "buggy_code_start_loc": [1, 75, 0, 4, 2], "filenames": ["CHANGELOG.md", "docs/configuration.rst", "tests/test_views_login.py", "two_factor/views/core.py", "two_factor/views/utils.py"], "fixing_code_end_loc": [10, 83, 414, 264, 197], "fixing_code_start_loc": [2, 76, 1, 5, 3... | 224 |
Determine whether the {function_name} code is vulnerable or not. | [
"import logging\nimport warnings\nfrom base64 import b32encode\nfrom binascii import unhexlify",
"import time",
"\nimport django_otp\nimport qrcode\nimport qrcode.image.svg\nfrom django.conf import settings\nfrom django.contrib.auth import REDIRECT_FIELD_NAME, login\nfrom django.contrib.auth.decorators import l... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1, 75, 334, 193, 166], "buggy_code_start_loc": [1, 75, 0, 4, 2], "filenames": ["CHANGELOG.md", "docs/configuration.rst", "tests/test_views_login.py", "two_factor/views/core.py", "two_factor/views/utils.py"], "fixing_code_end_loc": [10, 83, 414, 264, 197], "fixing_code_start_loc": [2, 76, 1, 5, 3... | 224 |
Determine whether the {function_name} code is vulnerable or not. | [
"import logging\n",
"",
"from django.core.exceptions import SuspiciousOperation\nfrom django.utils.decorators import method_decorator\nfrom django.utils.translation import gettext as _\nfrom formtools.wizard.forms import ManagementForm\nfrom formtools.wizard.storage.session import SessionStorage\nfrom formtools... | [
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [1, 75, 334, 193, 166], "buggy_code_start_loc": [1, 75, 0, 4, 2], "filenames": ["CHANGELOG.md", "docs/configuration.rst", "tests/test_views_login.py", "two_factor/views/core.py", "two_factor/views/utils.py"], "fixing_code_end_loc": [10, 83, 414, 264, 197], "fixing_code_start_loc": [2, 76, 1, 5, 3... | 224 |
Determine whether the {function_name} code is vulnerable or not. | [
"import logging\n",
"from django.contrib.auth import load_backend",
"from django.core.exceptions import SuspiciousOperation\nfrom django.utils.decorators import method_decorator\nfrom django.utils.translation import gettext as _\nfrom formtools.wizard.forms import ManagementForm\nfrom formtools.wizard.storage.s... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [1, 75, 334, 193, 166], "buggy_code_start_loc": [1, 75, 0, 4, 2], "filenames": ["CHANGELOG.md", "docs/configuration.rst", "tests/test_views_login.py", "two_factor/views/core.py", "two_factor/views/utils.py"], "fixing_code_end_loc": [10, 83, 414, 264, 197], "fixing_code_start_loc": [2, 76, 1, 5, 3... | 224 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Ayttm\n *\n * Copyright (C) 2003, 2009 the Ayttm team\n * \n * Ayttm is a derivative of Everybuddy\n * Copyright (C) 1998-1999, Torrey Searle\n * proxy featured by Seb C.\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
0,
1,
0,
1,
1,
0,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [350], "buggy_code_start_loc": [297], "filenames": ["libproxy/proxy.c"], "fixing_code_end_loc": [346], "fixing_code_start_loc": [296], "message": "A vulnerability, which was classified as critical, was found in ayttm up to 0.5.0.89. This affects the function http_connect in the library libproxy/p... | 225 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Ayttm\n *\n * Copyright (C) 2003, 2009 the Ayttm team\n * \n * Ayttm is a derivative of Everybuddy\n * Copyright (C) 1998-1999, Torrey Searle\n * proxy featured by Seb C.\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [350], "buggy_code_start_loc": [297], "filenames": ["libproxy/proxy.c"], "fixing_code_end_loc": [346], "fixing_code_start_loc": [296], "message": "A vulnerability, which was classified as critical, was found in ayttm up to 0.5.0.89. This affects the function http_connect in the library libproxy/p... | 225 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\nCopyright 2015, 2016 OpenMarket Ltd\nCopyright 2018 New Vector Ltd",
"Licensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at",
" http://www.apache.org/licenses/LICENSE-2.0",
"Unless re... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [292, 49], "buggy_code_start_loc": [291, 1], "filenames": ["src/components/views/messages/MFileBody.js", "src/usercontent/index.js"], "fixing_code_end_loc": [292, 42], "fixing_code_start_loc": [291, 0], "message": "matrix-react-sdk is an npm package which is a Matrix SDK for React Javascript. In ... | 226 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\nCopyright 2015, 2016 OpenMarket Ltd\nCopyright 2018 New Vector Ltd",
"Licensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at",
" http://www.apache.org/licenses/LICENSE-2.0",
"Unless re... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [292, 49], "buggy_code_start_loc": [291, 1], "filenames": ["src/components/views/messages/MFileBody.js", "src/usercontent/index.js"], "fixing_code_end_loc": [292, 42], "fixing_code_start_loc": [291, 0], "message": "matrix-react-sdk is an npm package which is a Matrix SDK for React Javascript. In ... | 226 |
Determine whether the {function_name} code is vulnerable or not. | [
"const params = window.location.search.substring(1).split('&');\nlet lockOrigin;\nfor (let i = 0; i < params.length; ++i) {\n const parts = params[i].split('=');\n if (parts[0] === 'origin') lockOrigin = decodeURIComponent(parts[1]);\n}\n",
"function remoteRender(event) {\n const data = event.data;",
"... | [
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [292, 49], "buggy_code_start_loc": [291, 1], "filenames": ["src/components/views/messages/MFileBody.js", "src/usercontent/index.js"], "fixing_code_end_loc": [292, 42], "fixing_code_start_loc": [291, 0], "message": "matrix-react-sdk is an npm package which is a Matrix SDK for React Javascript. In ... | 226 |
Determine whether the {function_name} code is vulnerable or not. | [
"",
"function remoteRender(event) {\n const data = event.data;",
" const img = document.createElement(\"img\");\n img.id = \"img\";\n img.src = data.imgSrc;\n img.style = data.imgStyle;",
" const a = document.createElement(\"a\");\n a.id = \"a\";\n a.rel = \"noreferrer noopener\";\n ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [292, 49], "buggy_code_start_loc": [291, 1], "filenames": ["src/components/views/messages/MFileBody.js", "src/usercontent/index.js"], "fixing_code_end_loc": [292, 42], "fixing_code_start_loc": [291, 0], "message": "matrix-react-sdk is an npm package which is a Matrix SDK for React Javascript. In ... | 226 |
Determine whether the {function_name} code is vulnerable or not. | [
"MerlinsBoard.Collections.Grades = Backbone.Collection.extend({\n initialize: function (options) {\n // this.owner = options[\"owner\"];\n this.course_id = options[\"course_id\"]\n this.url = \"api/users/\" + options[\"user_id\"] + \"/grades\"\n },",
" model: MerlinsBoard.Models.Grade,\n",
" getOrF... | [
1,
1,
0,
1,
1,
1,
1,
1,
0,
1,
0,
1,
0,
1,
0,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [43, 5, 156, 27, 6, 46, 30, 7, 56, 14, 4, 13, 49, 17, 17, 11], "buggy_code_start_loc": [10, 4, 35, 26, 3, 3, 3, 1, 4, 13, 2, 1, 2, 1, 17, 11], "filenames": ["app/assets/javascripts/collections/grades.js", "app/assets/javascripts/models/grade.js", "app/assets/javascripts/routers/router.js", "app/a... | 227 |
Determine whether the {function_name} code is vulnerable or not. | [
"MerlinsBoard.Collections.Grades = Backbone.Collection.extend({\n initialize: function (options) {\n // this.owner = options[\"owner\"];\n this.course_id = options[\"course_id\"]\n this.url = \"api/users/\" + options[\"user_id\"] + \"/grades\"\n },",
" model: MerlinsBoard.Models.Grade,\n",
" getOrF... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [43, 5, 156, 27, 6, 46, 30, 7, 56, 14, 4, 13, 49, 17, 17, 11], "buggy_code_start_loc": [10, 4, 35, 26, 3, 3, 3, 1, 4, 13, 2, 1, 2, 1, 17, 11], "filenames": ["app/assets/javascripts/collections/grades.js", "app/assets/javascripts/models/grade.js", "app/assets/javascripts/routers/router.js", "app/a... | 227 |
Determine whether the {function_name} code is vulnerable or not. | [
"MerlinsBoard.Models.Grade = Backbone.Model.extend({\n urlRoot: 'api/grades',\n validate: function () {}\n})"
] | [
0
] | PreciseBugs | {"buggy_code_end_loc": [43, 5, 156, 27, 6, 46, 30, 7, 56, 14, 4, 13, 49, 17, 17, 11], "buggy_code_start_loc": [10, 4, 35, 26, 3, 3, 3, 1, 4, 13, 2, 1, 2, 1, 17, 11], "filenames": ["app/assets/javascripts/collections/grades.js", "app/assets/javascripts/models/grade.js", "app/assets/javascripts/routers/router.js", "app/a... | 227 |
Determine whether the {function_name} code is vulnerable or not. | [
"MerlinsBoard.Models.Grade = Backbone.Model.extend({\n urlRoot: 'api/grades',\n validate: function () {}\n})"
] | [
1
] | PreciseBugs | {"buggy_code_end_loc": [43, 5, 156, 27, 6, 46, 30, 7, 56, 14, 4, 13, 49, 17, 17, 11], "buggy_code_start_loc": [10, 4, 35, 26, 3, 3, 3, 1, 4, 13, 2, 1, 2, 1, 17, 11], "filenames": ["app/assets/javascripts/collections/grades.js", "app/assets/javascripts/models/grade.js", "app/assets/javascripts/routers/router.js", "app/a... | 227 |
Determine whether the {function_name} code is vulnerable or not. | [
"MerlinsBoard.Routers.Router = Backbone.Router.extend({\n initialize: function (options) {\n this.$rootEl = options[\"rootEl\"];\n this.$sideNav = options[\"sideNav\"];\n this.$tabNav = options[\"tabNav\"];\n this.currentUser = MerlinsBoard.CurrentUser",
" var courseTabs = new MerlinsBoard.Views.C... | [
1,
1,
1,
1,
1,
0,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [43, 5, 156, 27, 6, 46, 30, 7, 56, 14, 4, 13, 49, 17, 17, 11], "buggy_code_start_loc": [10, 4, 35, 26, 3, 3, 3, 1, 4, 13, 2, 1, 2, 1, 17, 11], "filenames": ["app/assets/javascripts/collections/grades.js", "app/assets/javascripts/models/grade.js", "app/assets/javascripts/routers/router.js", "app/a... | 227 |
Determine whether the {function_name} code is vulnerable or not. | [
"MerlinsBoard.Routers.Router = Backbone.Router.extend({\n initialize: function (options) {\n this.$rootEl = options[\"rootEl\"];\n this.$sideNav = options[\"sideNav\"];\n this.$tabNav = options[\"tabNav\"];\n this.currentUser = MerlinsBoard.CurrentUser",
" var courseTabs = new MerlinsBoard.Views.C... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [43, 5, 156, 27, 6, 46, 30, 7, 56, 14, 4, 13, 49, 17, 17, 11], "buggy_code_start_loc": [10, 4, 35, 26, 3, 3, 3, 1, 4, 13, 2, 1, 2, 1, 17, 11], "filenames": ["app/assets/javascripts/collections/grades.js", "app/assets/javascripts/models/grade.js", "app/assets/javascripts/routers/router.js", "app/a... | 227 |
Determine whether the {function_name} code is vulnerable or not. | [
"MerlinsBoard.Views.CourseForm = Backbone.View.extend({\n initialize: function () {",
" this.listenTo(this.model,\"sync\",this.render)\n },",
"\ttemplate: JST[\"courses/form\"],",
"\trender: function () {\n\t\tvar renderedContent = this.template({course: this.model})\n this.$el.html(renderedContent);\... | [
1,
1,
1,
1,
1,
1,
0,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [43, 5, 156, 27, 6, 46, 30, 7, 56, 14, 4, 13, 49, 17, 17, 11], "buggy_code_start_loc": [10, 4, 35, 26, 3, 3, 3, 1, 4, 13, 2, 1, 2, 1, 17, 11], "filenames": ["app/assets/javascripts/collections/grades.js", "app/assets/javascripts/models/grade.js", "app/assets/javascripts/routers/router.js", "app/a... | 227 |
Determine whether the {function_name} code is vulnerable or not. | [
"MerlinsBoard.Views.CourseForm = Backbone.View.extend({\n initialize: function () {",
" this.listenTo(this.model,\"sync\",this.render)\n },",
"\ttemplate: JST[\"courses/form\"],",
"\trender: function () {\n\t\tvar renderedContent = this.template({course: this.model})\n this.$el.html(renderedContent);\... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [43, 5, 156, 27, 6, 46, 30, 7, 56, 14, 4, 13, 49, 17, 17, 11], "buggy_code_start_loc": [10, 4, 35, 26, 3, 3, 3, 1, 4, 13, 2, 1, 2, 1, 17, 11], "filenames": ["app/assets/javascripts/collections/grades.js", "app/assets/javascripts/models/grade.js", "app/assets/javascripts/routers/router.js", "app/a... | 227 |
Determine whether the {function_name} code is vulnerable or not. | [
"MerlinsBoard.Views.CoursesList = Backbone.View.extend({\n\tinitialize: function () {",
" \t\tthis.listenTo(this.collection, \"add remove sync\", this.render);",
"\t},",
"",
"\n\ttemplate: JST[\"courses/list\"],",
"\ttagName: \"ul\",",
"\tclassName: \"course-list\",",
"\trender: function () {\n\t\tvar... | [
1,
0,
1,
0,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [43, 5, 156, 27, 6, 46, 30, 7, 56, 14, 4, 13, 49, 17, 17, 11], "buggy_code_start_loc": [10, 4, 35, 26, 3, 3, 3, 1, 4, 13, 2, 1, 2, 1, 17, 11], "filenames": ["app/assets/javascripts/collections/grades.js", "app/assets/javascripts/models/grade.js", "app/assets/javascripts/routers/router.js", "app/a... | 227 |
Determine whether the {function_name} code is vulnerable or not. | [
"MerlinsBoard.Views.CoursesList = Backbone.View.extend({\n\tinitialize: function () {",
" \t\tthis.listenTo(this.collection, \"reset add sync\", this.render);",
"\t},",
"",
"\n\ttemplate: JST[\"courses/list\"],",
"\ttagName: \"ul\",",
"\tclassName: \"course-list\",",
"\trender: function () {\n\t\tvar ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [43, 5, 156, 27, 6, 46, 30, 7, 56, 14, 4, 13, 49, 17, 17, 11], "buggy_code_start_loc": [10, 4, 35, 26, 3, 3, 3, 1, 4, 13, 2, 1, 2, 1, 17, 11], "filenames": ["app/assets/javascripts/collections/grades.js", "app/assets/javascripts/models/grade.js", "app/assets/javascripts/routers/router.js", "app/a... | 227 |
Determine whether the {function_name} code is vulnerable or not. | [
"MerlinsBoard.Views.CoursesSearch = Backbone.View.extend({\n\tinitialize: function () {",
"\t\tthis.searchCollection = new MerlinsBoard.Collections.CoursesSearch();",
"\t},",
"\ttemplate: JST[\"courses/coursesearch\"],",
"\trender: function () {\n\t\tvar renderedContent = this.template({courses: this.collec... | [
1,
0,
1,
1,
1,
0,
1,
1,
1,
0,
1,
0,
1,
0,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [43, 5, 156, 27, 6, 46, 30, 7, 56, 14, 4, 13, 49, 17, 17, 11], "buggy_code_start_loc": [10, 4, 35, 26, 3, 3, 3, 1, 4, 13, 2, 1, 2, 1, 17, 11], "filenames": ["app/assets/javascripts/collections/grades.js", "app/assets/javascripts/models/grade.js", "app/assets/javascripts/routers/router.js", "app/a... | 227 |
Determine whether the {function_name} code is vulnerable or not. | [
"MerlinsBoard.Views.CoursesSearch = Backbone.View.extend({\n\tinitialize: function () {",
"",
"\t},",
"\ttemplate: JST[\"courses/coursesearch\"],",
"\trender: function () {\n\t\tvar renderedContent = this.template({courses: this.collection});\n\t\tthis.$el.html(renderedContent);\n\t\treturn this\n\t},\n",
... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [43, 5, 156, 27, 6, 46, 30, 7, 56, 14, 4, 13, 49, 17, 17, 11], "buggy_code_start_loc": [10, 4, 35, 26, 3, 3, 3, 1, 4, 13, 2, 1, 2, 1, 17, 11], "filenames": ["app/assets/javascripts/collections/grades.js", "app/assets/javascripts/models/grade.js", "app/assets/javascripts/routers/router.js", "app/a... | 227 |
Determine whether the {function_name} code is vulnerable or not. | [
"MerlinsBoard.Views.CoursesEnroll = Backbone.View.extend({\n\tinitialize: function () {",
"\t\tthis.coursesearchView = new MerlinsBoard.Views.CoursesSearch({collection: this.collection}); //render will put these in manually",
"\t\tthis.usercoursesView = new MerlinsBoard.Views.CoursesList({collection: this.model... | [
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
0,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [43, 5, 156, 27, 6, 46, 30, 7, 56, 14, 4, 13, 49, 17, 17, 11], "buggy_code_start_loc": [10, 4, 35, 26, 3, 3, 3, 1, 4, 13, 2, 1, 2, 1, 17, 11], "filenames": ["app/assets/javascripts/collections/grades.js", "app/assets/javascripts/models/grade.js", "app/assets/javascripts/routers/router.js", "app/a... | 227 |
Determine whether the {function_name} code is vulnerable or not. | [
"MerlinsBoard.Views.CoursesEnroll = Backbone.View.extend({\n\tinitialize: function () {",
"\t\tthis.coursesearchView = new MerlinsBoard.Views.CoursesSearch();",
"\t\tthis.usercoursesView = new MerlinsBoard.Views.CoursesList({collection: this.model.courses()});\n\t\tthis.usertaughtcoursesView = new MerlinsBoard.... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [43, 5, 156, 27, 6, 46, 30, 7, 56, 14, 4, 13, 49, 17, 17, 11], "buggy_code_start_loc": [10, 4, 35, 26, 3, 3, 3, 1, 4, 13, 2, 1, 2, 1, 17, 11], "filenames": ["app/assets/javascripts/collections/grades.js", "app/assets/javascripts/models/grade.js", "app/assets/javascripts/routers/router.js", "app/a... | 227 |
Determine whether the {function_name} code is vulnerable or not. | [
"MerlinsBoard.Views.SearchStudent = Backbone.View.extend({",
" initialize: function () {\n this.listenTo(this.collection, \"add remove reset\", this.render)\n },\n",
" className: \"grades-studentsearch\",",
"\n template: JST[\"grades/grades-student-search\"],",
" render: function () {\n var rende... | [
0,
1,
0,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [43, 5, 156, 27, 6, 46, 30, 7, 56, 14, 4, 13, 49, 17, 17, 11], "buggy_code_start_loc": [10, 4, 35, 26, 3, 3, 3, 1, 4, 13, 2, 1, 2, 1, 17, 11], "filenames": ["app/assets/javascripts/collections/grades.js", "app/assets/javascripts/models/grade.js", "app/assets/javascripts/routers/router.js", "app/a... | 227 |
Determine whether the {function_name} code is vulnerable or not. | [
"MerlinsBoard.Views.SearchStudentGradesResults = Backbone.View.extend({",
" initialize: function () {\n this.listenTo(this.collection, \"add remove reset\", this.render)\n },\n",
" className: \"grades-student-search\",",
"\n template: JST[\"grades/grades-student-search\"],",
" render: function () {\... | [
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [43, 5, 156, 27, 6, 46, 30, 7, 56, 14, 4, 13, 49, 17, 17, 11], "buggy_code_start_loc": [10, 4, 35, 26, 3, 3, 3, 1, 4, 13, 2, 1, 2, 1, 17, 11], "filenames": ["app/assets/javascripts/collections/grades.js", "app/assets/javascripts/models/grade.js", "app/assets/javascripts/routers/router.js", "app/a... | 227 |
Determine whether the {function_name} code is vulnerable or not. | [
"//Lists a students grade - an admin has access to this view to edit grades\nMerlinsBoard.Views.GradesStudent = Backbone.View.extend({\n initialize: function () {",
" this.listenTo(this.collection, \"add change:grade remove\", this.render)",
" _.bindAll(this, \"gradeSaveCallback\", \"gradeSaveErrorCallba... | [
1,
0,
1,
0,
1,
0,
1,
1,
1,
1,
0,
1,
0,
1,
1,
0,
1,
0,
1,
0,
1,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [43, 5, 156, 27, 6, 46, 30, 7, 56, 14, 4, 13, 49, 17, 17, 11], "buggy_code_start_loc": [10, 4, 35, 26, 3, 3, 3, 1, 4, 13, 2, 1, 2, 1, 17, 11], "filenames": ["app/assets/javascripts/collections/grades.js", "app/assets/javascripts/models/grade.js", "app/assets/javascripts/routers/router.js", "app/a... | 227 |
Determine whether the {function_name} code is vulnerable or not. | [
"//Lists a students grade - an admin has access to this view to edit grades\nMerlinsBoard.Views.GradesStudent = Backbone.View.extend({\n initialize: function () {",
" this.listenTo(this.collection, \"add change:grade remove sync\", this.render)",
" _.bindAll(this, \"gradeSaveCallback\", \"gradeSaveErrorC... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [43, 5, 156, 27, 6, 46, 30, 7, 56, 14, 4, 13, 49, 17, 17, 11], "buggy_code_start_loc": [10, 4, 35, 26, 3, 3, 3, 1, 4, 13, 2, 1, 2, 1, 17, 11], "filenames": ["app/assets/javascripts/collections/grades.js", "app/assets/javascripts/models/grade.js", "app/assets/javascripts/routers/router.js", "app/a... | 227 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.