prompt stringclasses 1
value | completions listlengths 1 63.8k | labels listlengths 1 63.8k | source stringclasses 1
value | other_info stringlengths 2.06k 101k | index int64 0 6.83k |
|---|---|---|---|---|---|
Determine whether the {function_name} code is vulnerable or not. | [
"<!-- This will be the view for all courses...eventually a search should go here..http://stackoverflow.com/questions/14206259/backbone-structure-for-search-form-and-results",
"all this will be is organized links-->",
"<form class = \"course-find\">\n\t<label> Find Course\n\t<input type=\"text\" class=\"course-f... | [
1,
1,
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [43, 5, 156, 27, 6, 46, 30, 7, 56, 14, 4, 13, 49, 17, 17, 11], "buggy_code_start_loc": [10, 4, 35, 26, 3, 3, 3, 1, 4, 13, 2, 1, 2, 1, 17, 11], "filenames": ["app/assets/javascripts/collections/grades.js", "app/assets/javascripts/models/grade.js", "app/assets/javascripts/routers/router.js", "app/a... | 227 |
Determine whether the {function_name} code is vulnerable or not. | [
"<!-- This will be the view for all courses...eventually a search should go here..http://stackoverflow.com/questions/14206259/backbone-structure-for-search-form-and-results",
"all this will be is organized links-->",
"<form class = \"course-find\">\n\t<label> Find Course\n\t<input type=\"text\" class=\"course-f... | [
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [43, 5, 156, 27, 6, 46, 30, 7, 56, 14, 4, 13, 49, 17, 17, 11], "buggy_code_start_loc": [10, 4, 35, 26, 3, 3, 3, 1, 4, 13, 2, 1, 2, 1, 17, 11], "filenames": ["app/assets/javascripts/collections/grades.js", "app/assets/javascripts/models/grade.js", "app/assets/javascripts/routers/router.js", "app/a... | 227 |
Determine whether the {function_name} code is vulnerable or not. | [
"<% courses.each( function (course) { %>",
"\t<li><a href=\"#\" data-id=\"<%=course.id%>\"><%= course.escape(\"name\") %></a></li>",
"<% })%>"
] | [
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [43, 5, 156, 27, 6, 46, 30, 7, 56, 14, 4, 13, 49, 17, 17, 11], "buggy_code_start_loc": [10, 4, 35, 26, 3, 3, 3, 1, 4, 13, 2, 1, 2, 1, 17, 11], "filenames": ["app/assets/javascripts/collections/grades.js", "app/assets/javascripts/models/grade.js", "app/assets/javascripts/routers/router.js", "app/a... | 227 |
Determine whether the {function_name} code is vulnerable or not. | [
"<% courses.each( function (course) { %>",
"\t<li><a href=\"<%= '#course/' + course.id + '/enroll'%>\"><%= course.escape(\"name\") %></a></li>",
"<% })%>"
] | [
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [43, 5, 156, 27, 6, 46, 30, 7, 56, 14, 4, 13, 49, 17, 17, 11], "buggy_code_start_loc": [10, 4, 35, 26, 3, 3, 3, 1, 4, 13, 2, 1, 2, 1, 17, 11], "filenames": ["app/assets/javascripts/collections/grades.js", "app/assets/javascripts/models/grade.js", "app/assets/javascripts/routers/router.js", "app/a... | 227 |
Determine whether the {function_name} code is vulnerable or not. | [
"<h1>Grades for <%=grades.escape('fname') + \" \" + grades.escape('lname')%></h1>",
"\n<section class=\"grade-errors\"></section>",
"<% grades.each(function (grade) { %>",
" <h4> grade.escape('assignment_title') </h4>\n <p> grade.escape('description')</p>",
" Grade: <strong class=\"grade-number\" data-id... | [
0,
1,
1,
0,
1,
0
] | PreciseBugs | {"buggy_code_end_loc": [43, 5, 156, 27, 6, 46, 30, 7, 56, 14, 4, 13, 49, 17, 17, 11], "buggy_code_start_loc": [10, 4, 35, 26, 3, 3, 3, 1, 4, 13, 2, 1, 2, 1, 17, 11], "filenames": ["app/assets/javascripts/collections/grades.js", "app/assets/javascripts/models/grade.js", "app/assets/javascripts/routers/router.js", "app/a... | 227 |
Determine whether the {function_name} code is vulnerable or not. | [
"<h1>Grades for <%= student.escape('fname') + \" \" + student.escape('lname')%></h1>",
"\n<section class=\"grade-errors\"></section>",
"<% grades.each(function (grade) { %>",
" <h4> Assignment name:<%= grade.escape('title') %></h4>\n <p> description: <%= grade.escape('description') %></p>",
" Grade: <str... | [
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [43, 5, 156, 27, 6, 46, 30, 7, 56, 14, 4, 13, 49, 17, 17, 11], "buggy_code_start_loc": [10, 4, 35, 26, 3, 3, 3, 1, 4, 13, 2, 1, 2, 1, 17, 11], "filenames": ["app/assets/javascripts/collections/grades.js", "app/assets/javascripts/models/grade.js", "app/assets/javascripts/routers/router.js", "app/a... | 227 |
Determine whether the {function_name} code is vulnerable or not. | [
"class Api::GradesController < Api::ApiController",
" before_action(except: [:index]) {admins_only(params[\"course_id\"])} #wil always need to pass this in on every fetch",
" before_action :is_user_or_instructor?, only: [:index]",
" def index\n #I may want an internal control here instead of using the b... | [
1,
0,
1,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
1,
1,
1,
0,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [43, 5, 156, 27, 6, 46, 30, 7, 56, 14, 4, 13, 49, 17, 17, 11], "buggy_code_start_loc": [10, 4, 35, 26, 3, 3, 3, 1, 4, 13, 2, 1, 2, 1, 17, 11], "filenames": ["app/assets/javascripts/collections/grades.js", "app/assets/javascripts/models/grade.js", "app/assets/javascripts/routers/router.js", "app/a... | 227 |
Determine whether the {function_name} code is vulnerable or not. | [
"class Api::GradesController < Api::ApiController",
" before_action(only: [:update, :show]) {admins_only(params[\"course_id\"])}",
" before_action :is_user_or_instructor?, only: [:index]",
" def index\n #I may want an internal control here instead of using the before_action...\n @grades = Grade.inclu... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [43, 5, 156, 27, 6, 46, 30, 7, 56, 14, 4, 13, 49, 17, 17, 11], "buggy_code_start_loc": [10, 4, 35, 26, 3, 3, 3, 1, 4, 13, 2, 1, 2, 1, 17, 11], "filenames": ["app/assets/javascripts/collections/grades.js", "app/assets/javascripts/models/grade.js", "app/assets/javascripts/routers/router.js", "app/a... | 227 |
Determine whether the {function_name} code is vulnerable or not. | [
"json.grades @grades do |grade_obj|",
"",
" json.grade grade_obj.grade",
" json.assignment_id grade_obj.assignment_id",
" json.user_id grade_obj.user_id",
" json.assignment_title grade_obj.assignment.title\n json.assignment_description grade_obj.assignment.description",
"end",
"json.student_fname... | [
1,
0,
1,
0,
1,
0,
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [43, 5, 156, 27, 6, 46, 30, 7, 56, 14, 4, 13, 49, 17, 17, 11], "buggy_code_start_loc": [10, 4, 35, 26, 3, 3, 3, 1, 4, 13, 2, 1, 2, 1, 17, 11], "filenames": ["app/assets/javascripts/collections/grades.js", "app/assets/javascripts/models/grade.js", "app/assets/javascripts/routers/router.js", "app/a... | 227 |
Determine whether the {function_name} code is vulnerable or not. | [
"json.grades @grades do |grade_obj|",
" json.id grade_obj.id",
" json.grade grade_obj.grade",
" json.id grade_obj.assignment_id",
" json.user_id grade_obj.user_id",
" json.title grade_obj.assignment.title\n json.description grade_obj.assignment.description",
"end",
"json.student_fname @student.f... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [43, 5, 156, 27, 6, 46, 30, 7, 56, 14, 4, 13, 49, 17, 17, 11], "buggy_code_start_loc": [10, 4, 35, 26, 3, 3, 3, 1, 4, 13, 2, 1, 2, 1, 17, 11], "filenames": ["app/assets/javascripts/collections/grades.js", "app/assets/javascripts/models/grade.js", "app/assets/javascripts/routers/router.js", "app/a... | 227 |
Determine whether the {function_name} code is vulnerable or not. | [
"Rails.application.routes.draw do\n resources :resources",
"\troot to: \"static_pages#root\"",
" \tresources :users, only: [:new, :create, :show]\n\tresource :session, only: [:new, :create, :destroy]\n# resources :coursesinstructors, only: [:create, :destroy]\n# \tresources :coursesstudents, only: [:create, ... | [
1,
1,
1,
1,
0,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [43, 5, 156, 27, 6, 46, 30, 7, 56, 14, 4, 13, 49, 17, 17, 11], "buggy_code_start_loc": [10, 4, 35, 26, 3, 3, 3, 1, 4, 13, 2, 1, 2, 1, 17, 11], "filenames": ["app/assets/javascripts/collections/grades.js", "app/assets/javascripts/models/grade.js", "app/assets/javascripts/routers/router.js", "app/a... | 227 |
Determine whether the {function_name} code is vulnerable or not. | [
"Rails.application.routes.draw do\n resources :resources",
"\troot to: \"static_pages#root\"",
" \tresources :users, only: [:new, :create, :show]\n\tresource :session, only: [:new, :create, :destroy]\n# resources :coursesinstructors, only: [:create, :destroy]\n# \tresources :coursesstudents, only: [:create, ... | [
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [43, 5, 156, 27, 6, 46, 30, 7, 56, 14, 4, 13, 49, 17, 17, 11], "buggy_code_start_loc": [10, 4, 35, 26, 3, 3, 3, 1, 4, 13, 2, 1, 2, 1, 17, 11], "filenames": ["app/assets/javascripts/collections/grades.js", "app/assets/javascripts/models/grade.js", "app/assets/javascripts/routers/router.js", "app/a... | 227 |
Determine whether the {function_name} code is vulnerable or not. | [
"# This file should contain all the record creation needed to seed the database with its default values.\n# The data can then be loaded with the rake db:seed (or created alongside the db with db:setup).\n#\n# Examples:\n#\n# cities = City.create([{ name: 'Chicago' }, { name: 'Copenhagen' }])\n# Mayor.create(nam... | [
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [43, 5, 156, 27, 6, 46, 30, 7, 56, 14, 4, 13, 49, 17, 17, 11], "buggy_code_start_loc": [10, 4, 35, 26, 3, 3, 3, 1, 4, 13, 2, 1, 2, 1, 17, 11], "filenames": ["app/assets/javascripts/collections/grades.js", "app/assets/javascripts/models/grade.js", "app/assets/javascripts/routers/router.js", "app/a... | 227 |
Determine whether the {function_name} code is vulnerable or not. | [
"# This file should contain all the record creation needed to seed the database with its default values.\n# The data can then be loaded with the rake db:seed (or created alongside the db with db:setup).\n#\n# Examples:\n#\n# cities = City.create([{ name: 'Chicago' }, { name: 'Copenhagen' }])\n# Mayor.create(nam... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [43, 5, 156, 27, 6, 46, 30, 7, 56, 14, 4, 13, 49, 17, 17, 11], "buggy_code_start_loc": [10, 4, 35, 26, 3, 3, 3, 1, 4, 13, 2, 1, 2, 1, 17, 11], "filenames": ["app/assets/javascripts/collections/grades.js", "app/assets/javascripts/models/grade.js", "app/assets/javascripts/routers/router.js", "app/a... | 227 |
Determine whether the {function_name} code is vulnerable or not. | [
"module Sns::LoginFilter\n extend ActiveSupport::Concern",
" included do\n protect_from_forgery except: :remote_login\n skip_before_action :verify_authenticity_token unless SS.config.env.protect_csrf\n prepend_view_path \"app/views/sns/login\"\n layout \"ss/login\"\n navi_view nil\n end",
" p... | [
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [26], "buggy_code_start_loc": [25], "filenames": ["app/controllers/concerns/sns/login_filter.rb"], "fixing_code_end_loc": [26], "fixing_code_start_loc": [25], "message": "Open redirect vulnerability in SHIRASAGI v1.7.0 and earlier allows remote attackers to redirect users to arbitrary web sites a... | 228 |
Determine whether the {function_name} code is vulnerable or not. | [
"module Sns::LoginFilter\n extend ActiveSupport::Concern",
" included do\n protect_from_forgery except: :remote_login\n skip_before_action :verify_authenticity_token unless SS.config.env.protect_csrf\n prepend_view_path \"app/views/sns/login\"\n layout \"ss/login\"\n navi_view nil\n end",
" p... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [26], "buggy_code_start_loc": [25], "filenames": ["app/controllers/concerns/sns/login_filter.rb"], "fixing_code_end_loc": [26], "fixing_code_start_loc": [25], "message": "Open redirect vulnerability in SHIRASAGI v1.7.0 and earlier allows remote attackers to redirect users to arbitrary web sites a... | 228 |
Determine whether the {function_name} code is vulnerable or not. | [
"",
"Version 2.0.4 (September 26th, 2016)\n------------------------------------------------------------------------",
" * [Security] Prevent moving files by using their directory name.\n [Security] Possible SQL injection for entry category assignment\n [Security] Possible SQL injection for removing... | [
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [0, 477, 51, 78], "buggy_code_start_loc": [0, 228, 50, 57], "filenames": ["docs/NEWS", "include/admin/images.inc.php", "serendipity_config.inc.php", "templates/2k11/admin/category.inc.tpl"], "fixing_code_end_loc": [10, 480, 51, 78], "fixing_code_start_loc": [1, 228, 50, 57], "message": "In Serend... | 229 |
Determine whether the {function_name} code is vulnerable or not. | [
"Version 2.0.5 (November 28th, 2016)\n------------------------------------------------------------------------",
" * [Security] Improve preventing fetching local files, thanks to\n Xu Yue.\n \n * [Security] Prevent XSS in adding category and directory names, \n thanks to Edric Teo @smarterbit... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [0, 477, 51, 78], "buggy_code_start_loc": [0, 228, 50, 57], "filenames": ["docs/NEWS", "include/admin/images.inc.php", "serendipity_config.inc.php", "templates/2k11/admin/category.inc.tpl"], "fixing_code_end_loc": [10, 480, 51, 78], "fixing_code_start_loc": [1, 228, 50, 57], "message": "In Serend... | 229 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"if (IN_serendipity !== true) {\n die (\"Don't hack!\");\n}",
"if (!serendipity_checkPermission('adminImages')) {\n return;\n}",
"$data = array();",
"if (!is_object($serendipity['smarty'])) {\n serendipity_smarty_init();\n}",
"switch ($serendipity['GET']['adminAction']) {",
" case '... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [0, 477, 51, 78], "buggy_code_start_loc": [0, 228, 50, 57], "filenames": ["docs/NEWS", "include/admin/images.inc.php", "serendipity_config.inc.php", "templates/2k11/admin/category.inc.tpl"], "fixing_code_end_loc": [10, 480, 51, 78], "fixing_code_start_loc": [1, 228, 50, 57], "message": "In Serend... | 229 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"if (IN_serendipity !== true) {\n die (\"Don't hack!\");\n}",
"if (!serendipity_checkPermission('adminImages')) {\n return;\n}",
"$data = array();",
"if (!is_object($serendipity['smarty'])) {\n serendipity_smarty_init();\n}",
"switch ($serendipity['GET']['adminAction']) {",
" case '... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [0, 477, 51, 78], "buggy_code_start_loc": [0, 228, 50, 57], "filenames": ["docs/NEWS", "include/admin/images.inc.php", "serendipity_config.inc.php", "templates/2k11/admin/category.inc.tpl"], "fixing_code_end_loc": [10, 480, 51, 78], "fixing_code_start_loc": [1, 228, 50, 57], "message": "In Serend... | 229 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n# Copyright (c) 2003-2005, Jannis Hermanns (on behalf the Serendipity Developer Team)\n# All rights reserved. See LICENSE file for licensing details",
"if (defined('S9Y_FRAMEWORK')) {\n return;\n}",
"@define('S9Y_FRAMEWORK', true);\nif (!headers_sent() && php_sapi_name() !== 'cli') {\n // Only se... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [0, 477, 51, 78], "buggy_code_start_loc": [0, 228, 50, 57], "filenames": ["docs/NEWS", "include/admin/images.inc.php", "serendipity_config.inc.php", "templates/2k11/admin/category.inc.tpl"], "fixing_code_end_loc": [10, 480, 51, 78], "fixing_code_start_loc": [1, 228, 50, 57], "message": "In Serend... | 229 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n# Copyright (c) 2003-2005, Jannis Hermanns (on behalf the Serendipity Developer Team)\n# All rights reserved. See LICENSE file for licensing details",
"if (defined('S9Y_FRAMEWORK')) {\n return;\n}",
"@define('S9Y_FRAMEWORK', true);\nif (!headers_sent() && php_sapi_name() !== 'cli') {\n // Only se... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [0, 477, 51, 78], "buggy_code_start_loc": [0, 228, 50, 57], "filenames": ["docs/NEWS", "include/admin/images.inc.php", "serendipity_config.inc.php", "templates/2k11/admin/category.inc.tpl"], "fixing_code_end_loc": [10, 480, 51, 78], "fixing_code_start_loc": [1, 228, 50, 57], "message": "In Serend... | 229 |
Determine whether the {function_name} code is vulnerable or not. | [
"{if $post_save}\n {if $new}\n <span class=\"msg_success\"><span class=\"icon-ok-circled\"></span> {$CONST.CATEGORY_SAVED}</span>\n {/if}\n {if $edit}\n {if isset($editPermission) && $editPermission == false}\n <span class=\"msg_error\"><span class=\"icon-attention-circled\"></span> {$... | [
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [0, 477, 51, 78], "buggy_code_start_loc": [0, 228, 50, 57], "filenames": ["docs/NEWS", "include/admin/images.inc.php", "serendipity_config.inc.php", "templates/2k11/admin/category.inc.tpl"], "fixing_code_end_loc": [10, 480, 51, 78], "fixing_code_start_loc": [1, 228, 50, 57], "message": "In Serend... | 229 |
Determine whether the {function_name} code is vulnerable or not. | [
"{if $post_save}\n {if $new}\n <span class=\"msg_success\"><span class=\"icon-ok-circled\"></span> {$CONST.CATEGORY_SAVED}</span>\n {/if}\n {if $edit}\n {if isset($editPermission) && $editPermission == false}\n <span class=\"msg_error\"><span class=\"icon-attention-circled\"></span> {$... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [0, 477, 51, 78], "buggy_code_start_loc": [0, 228, 50, 57], "filenames": ["docs/NEWS", "include/admin/images.inc.php", "serendipity_config.inc.php", "templates/2k11/admin/category.inc.tpl"], "fixing_code_end_loc": [10, 480, 51, 78], "fixing_code_start_loc": [1, 228, 50, 57], "message": "In Serend... | 229 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* Copyright 2015 The TensorFlow Authors. All Rights Reserved.",
"Licensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at",
" http://www.apache.org/licenses/LICENSE-2.0",
"Unless required b... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [85, 1848], "buggy_code_start_loc": [83, 1848], "filenames": ["tensorflow/core/kernels/tensor_array_ops.cc", "tensorflow/python/kernel_tests/data_structures/tensor_array_ops_test.py"], "fixing_code_end_loc": [86, 1865], "fixing_code_start_loc": [83, 1849], "message": "TensorFlow is an open source... | 230 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* Copyright 2015 The TensorFlow Authors. All Rights Reserved.",
"Licensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at",
" http://www.apache.org/licenses/LICENSE-2.0",
"Unless required b... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [85, 1848], "buggy_code_start_loc": [83, 1848], "filenames": ["tensorflow/core/kernels/tensor_array_ops.cc", "tensorflow/python/kernel_tests/data_structures/tensor_array_ops_test.py"], "fixing_code_end_loc": [86, 1865], "fixing_code_start_loc": [83, 1849], "message": "TensorFlow is an open source... | 230 |
Determine whether the {function_name} code is vulnerable or not. | [
"# Copyright 2015 The TensorFlow Authors. All Rights Reserved.\n#\n# Licensed under the Apache License, Version 2.0 (the \"License\");\n# you may not use this file except in compliance with the License.\n# You may obtain a copy of the License at\n#\n# http://www.apache.org/licenses/LICENSE-2.0\n#\n# Unless requ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [85, 1848], "buggy_code_start_loc": [83, 1848], "filenames": ["tensorflow/core/kernels/tensor_array_ops.cc", "tensorflow/python/kernel_tests/data_structures/tensor_array_ops_test.py"], "fixing_code_end_loc": [86, 1865], "fixing_code_start_loc": [83, 1849], "message": "TensorFlow is an open source... | 230 |
Determine whether the {function_name} code is vulnerable or not. | [
"# Copyright 2015 The TensorFlow Authors. All Rights Reserved.\n#\n# Licensed under the Apache License, Version 2.0 (the \"License\");\n# you may not use this file except in compliance with the License.\n# You may obtain a copy of the License at\n#\n# http://www.apache.org/licenses/LICENSE-2.0\n#\n# Unless requ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [85, 1848], "buggy_code_start_loc": [83, 1848], "filenames": ["tensorflow/core/kernels/tensor_array_ops.cc", "tensorflow/python/kernel_tests/data_structures/tensor_array_ops_test.py"], "fixing_code_end_loc": [86, 1865], "fixing_code_start_loc": [83, 1849], "message": "TensorFlow is an open source... | 230 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n +----------------------------------------------------------------------+\n | PHP Version 5 |\n +----------------------------------------------------------------------+\n | Copyright (c) 1997-2014 The PHP Group |\n ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [519], "buggy_code_start_loc": [519], "filenames": ["ext/standard/dns.c"], "fixing_code_end_loc": [524], "fixing_code_start_loc": [520], "message": "Heap-based buffer overflow in the php_parserr function in ext/standard/dns.c in PHP 5.6.0beta4 and earlier allows remote servers to cause a denial o... | 231 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n +----------------------------------------------------------------------+\n | PHP Version 5 |\n +----------------------------------------------------------------------+\n | Copyright (c) 1997-2014 The PHP Group |\n ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [519], "buggy_code_start_loc": [519], "filenames": ["ext/standard/dns.c"], "fixing_code_end_loc": [524], "fixing_code_start_loc": [520], "message": "Heap-based buffer overflow in the php_parserr function in ext/standard/dns.c in PHP 5.6.0beta4 and earlier allows remote servers to cause a denial o... | 231 |
Determine whether the {function_name} code is vulnerable or not. | [
"# frozen_string_literal: true",
"class StrippedLengthValidator < ActiveModel::EachValidator\n def self.validate(record, attribute, value, range)",
" if !value.nil?",
" value = get_sanitized_value(value)",
" record.errors.add attribute, (I18n.t('errors.messages.too_short', count: range.begin))... | [
1,
1,
0,
1,
0,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [11, 1046], "buggy_code_start_loc": [5, 1046], "filenames": ["lib/validators/stripped_length_validator.rb", "spec/requests/posts_controller_spec.rb"], "fixing_code_end_loc": [15, 1061], "fixing_code_start_loc": [5, 1047], "message": "Discourse is an option source discussion platform. Prior to ver... | 232 |
Determine whether the {function_name} code is vulnerable or not. | [
"# frozen_string_literal: true",
"class StrippedLengthValidator < ActiveModel::EachValidator\n def self.validate(record, attribute, value, range)",
" if value.nil?\n record.errors.add attribute, I18n.t('errors.messages.blank')\n elsif value.length > range.end\n record.errors.add attribute, I18n... | [
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [11, 1046], "buggy_code_start_loc": [5, 1046], "filenames": ["lib/validators/stripped_length_validator.rb", "spec/requests/posts_controller_spec.rb"], "fixing_code_end_loc": [15, 1061], "fixing_code_start_loc": [5, 1047], "message": "Discourse is an option source discussion platform. Prior to ver... | 232 |
Determine whether the {function_name} code is vulnerable or not. | [
"# frozen_string_literal: true",
"RSpec.shared_examples 'finding and showing post' do\n let!(:post) { post_by_user }",
" it \"ensures the user can't see the post\" do\n topic = post.topic\n topic.convert_to_private_message(Discourse.system_user)\n topic.remove_allowed_user(Discourse.system_user, user... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [11, 1046], "buggy_code_start_loc": [5, 1046], "filenames": ["lib/validators/stripped_length_validator.rb", "spec/requests/posts_controller_spec.rb"], "fixing_code_end_loc": [15, 1061], "fixing_code_start_loc": [5, 1047], "message": "Discourse is an option source discussion platform. Prior to ver... | 232 |
Determine whether the {function_name} code is vulnerable or not. | [
"# frozen_string_literal: true",
"RSpec.shared_examples 'finding and showing post' do\n let!(:post) { post_by_user }",
" it \"ensures the user can't see the post\" do\n topic = post.topic\n topic.convert_to_private_message(Discourse.system_user)\n topic.remove_allowed_user(Discourse.system_user, user... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [11, 1046], "buggy_code_start_loc": [5, 1046], "filenames": ["lib/validators/stripped_length_validator.rb", "spec/requests/posts_controller_spec.rb"], "fixing_code_end_loc": [15, 1061], "fixing_code_start_loc": [5, 1047], "message": "Discourse is an option source discussion platform. Prior to ver... | 232 |
Determine whether the {function_name} code is vulnerable or not. | [
"C.P.Sub 公告系統\n=======\n<h4>前言</h4>",
"PHP 公告系統,用 CSV 格式建構出來的小型 PHP 程式。",
"基本上就是強化舊版的功能,改寫一下內部架構,並套用了 Bootstrap ,所以自行更換樣式!",
"如果使用上有遇到什麼問題,或是有程式上的建議、架構上的建議、甚至是功能上的建議,都歡迎來信告知。",
"當然,最重要的是要記得 Bug 回報~",
"=======",
"<h4>安裝方式</h4>",
"<h3>1. Server 健康檢查</h3>\n<ul>\n <li>環境:PHP 5.3 以上 (建議)</li>\n <li>PHP.i... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [122], "buggy_code_start_loc": [52], "filenames": ["README.md"], "fixing_code_end_loc": [123], "fixing_code_start_loc": [52], "message": "C.P.Sub before 5.3 allows CSRF via a manage.php?p=article_del&id= URI.", "other": {"cve": {"cisaActionDue": null, "cisaExploitAdd": null, "cisaRequiredAction":... | 233 |
Determine whether the {function_name} code is vulnerable or not. | [
"C.P.Sub 公告系統\n=======\n<h4>前言</h4>",
"PHP 公告系統,用 CSV 格式建構出來的小型 PHP 程式。",
"基本上就是強化舊版的功能,改寫一下內部架構,並套用了 Bootstrap ,所以自行更換樣式!",
"如果使用上有遇到什麼問題,或是有程式上的建議、架構上的建議、甚至是功能上的建議,都歡迎來信告知。",
"當然,最重要的是要記得 Bug 回報~",
"=======",
"<h4>安裝方式</h4>",
"<h3>1. Server 健康檢查</h3>\n<ul>\n <li>環境:PHP 5.3 以上 (建議)</li>\n <li>PHP.i... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [122], "buggy_code_start_loc": [52], "filenames": ["README.md"], "fixing_code_end_loc": [123], "fixing_code_start_loc": [52], "message": "C.P.Sub before 5.3 allows CSRF via a manage.php?p=article_del&id= URI.", "other": {"cve": {"cisaActionDue": null, "cisaExploitAdd": null, "cisaRequiredAction":... | 233 |
Determine whether the {function_name} code is vulnerable or not. | [
"# For more information on configuration, see:\n# * Official English Documentation: http://nginx.org/en/docs/",
"daemon on;\nworker_processes auto;\nerror_log /dev/stderr;\npid /tmp/nginx.pid;",
"# Load dynamic modules. See /usr/share/doc/nginx/README.dynamic.\ninclude /usr/share/nginx/modules/*.conf;",
"ev... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [66, 20, 34, 89], "buggy_code_start_loc": [64, 20, 33, 89], "filenames": ["etc/nginx.conf", "tcms/core/middleware.py", "tcms/settings/devel.py", "tests/test_http.sh"], "fixing_code_end_loc": [69, 38, 37, 94], "fixing_code_start_loc": [65, 21, 33, 90], "message": "Kiwi TCMS is an open source test ... | 234 |
Determine whether the {function_name} code is vulnerable or not. | [
"# For more information on configuration, see:\n# * Official English Documentation: http://nginx.org/en/docs/",
"daemon on;\nworker_processes auto;\nerror_log /dev/stderr;\npid /tmp/nginx.pid;",
"# Load dynamic modules. See /usr/share/doc/nginx/README.dynamic.\ninclude /usr/share/nginx/modules/*.conf;",
"ev... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [66, 20, 34, 89], "buggy_code_start_loc": [64, 20, 33, 89], "filenames": ["etc/nginx.conf", "tcms/core/middleware.py", "tcms/settings/devel.py", "tests/test_http.sh"], "fixing_code_end_loc": [69, 38, 37, 94], "fixing_code_start_loc": [65, 21, 33, 90], "message": "Kiwi TCMS is an open source test ... | 234 |
Determine whether the {function_name} code is vulnerable or not. | [
"# pylint: disable=no-self-use, too-few-public-methods",
"from django.conf import settings\nfrom django.contrib.sites.models import Site\nfrom django.db.utils import OperationalError, ProgrammingError\nfrom django.http import HttpResponseRedirect\nfrom django.urls import reverse\nfrom django.utils.deprecation imp... | [
1,
1,
1,
0
] | PreciseBugs | {"buggy_code_end_loc": [66, 20, 34, 89], "buggy_code_start_loc": [64, 20, 33, 89], "filenames": ["etc/nginx.conf", "tcms/core/middleware.py", "tcms/settings/devel.py", "tests/test_http.sh"], "fixing_code_end_loc": [69, 38, 37, 94], "fixing_code_start_loc": [65, 21, 33, 90], "message": "Kiwi TCMS is an open source test ... | 234 |
Determine whether the {function_name} code is vulnerable or not. | [
"# pylint: disable=no-self-use, too-few-public-methods",
"from django.conf import settings\nfrom django.contrib.sites.models import Site\nfrom django.db.utils import OperationalError, ProgrammingError\nfrom django.http import HttpResponseRedirect\nfrom django.urls import reverse\nfrom django.utils.deprecation imp... | [
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [66, 20, 34, 89], "buggy_code_start_loc": [64, 20, 33, 89], "filenames": ["etc/nginx.conf", "tcms/core/middleware.py", "tcms/settings/devel.py", "tests/test_http.sh"], "fixing_code_end_loc": [69, 38, 37, 94], "fixing_code_start_loc": [65, 21, 33, 90], "message": "Kiwi TCMS is an open source test ... | 234 |
Determine whether the {function_name} code is vulnerable or not. | [
"# pylint: disable=wildcard-import, unused-wildcard-import\n\"\"\"\n Django settings for devel env.\n\"\"\"",
"import os",
"from .common import * # noqa: F403",
"# Debug settings\nDEBUG = True",
"# Database settings\nDATABASES = {\n \"default\": {\n \"ENGINE\": \"django.db.backends.sqlite3\",\... | [
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [66, 20, 34, 89], "buggy_code_start_loc": [64, 20, 33, 89], "filenames": ["etc/nginx.conf", "tcms/core/middleware.py", "tcms/settings/devel.py", "tests/test_http.sh"], "fixing_code_end_loc": [69, 38, 37, 94], "fixing_code_start_loc": [65, 21, 33, 90], "message": "Kiwi TCMS is an open source test ... | 234 |
Determine whether the {function_name} code is vulnerable or not. | [
"# pylint: disable=wildcard-import, unused-wildcard-import\n\"\"\"\n Django settings for devel env.\n\"\"\"",
"import os",
"from .common import * # noqa: F403",
"# Debug settings\nDEBUG = True",
"# Database settings\nDATABASES = {\n \"default\": {\n \"ENGINE\": \"django.db.backends.sqlite3\",\... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [66, 20, 34, 89], "buggy_code_start_loc": [64, 20, 33, 89], "filenames": ["etc/nginx.conf", "tcms/core/middleware.py", "tcms/settings/devel.py", "tests/test_http.sh"], "fixing_code_end_loc": [69, 38, 37, 94], "fixing_code_start_loc": [65, 21, 33, 90], "message": "Kiwi TCMS is an open source test ... | 234 |
Determine whether the {function_name} code is vulnerable or not. | [
"#!/bin/bash",
". /usr/share/beakerlib/beakerlib.sh",
"assert_up_and_running() {\n sleep 10\n # HTTP redirects; HTTPS display the login page\n rlRun -t -c \"curl -o- http://localhost/ | grep '301 Moved Permanently'\"\n rlRun -t -c \"curl -k -L -o- https://localhost/ | grep 'Welcome to Kiwi TC... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [66, 20, 34, 89], "buggy_code_start_loc": [64, 20, 33, 89], "filenames": ["etc/nginx.conf", "tcms/core/middleware.py", "tcms/settings/devel.py", "tests/test_http.sh"], "fixing_code_end_loc": [69, 38, 37, 94], "fixing_code_start_loc": [65, 21, 33, 90], "message": "Kiwi TCMS is an open source test ... | 234 |
Determine whether the {function_name} code is vulnerable or not. | [
"#!/bin/bash",
". /usr/share/beakerlib/beakerlib.sh",
"assert_up_and_running() {\n sleep 10\n # HTTP redirects; HTTPS display the login page\n rlRun -t -c \"curl -o- http://localhost/ | grep '301 Moved Permanently'\"\n rlRun -t -c \"curl -k -L -o- https://localhost/ | grep 'Welcome to Kiwi TC... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [66, 20, 34, 89], "buggy_code_start_loc": [64, 20, 33, 89], "filenames": ["etc/nginx.conf", "tcms/core/middleware.py", "tcms/settings/devel.py", "tests/test_http.sh"], "fixing_code_end_loc": [69, 38, 37, 94], "fixing_code_start_loc": [65, 21, 33, 90], "message": "Kiwi TCMS is an open source test ... | 234 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* Wireless extensions support.\n *\n * See copyright notice in main.c\n */\n#include <linux/slab.h>\n#include <linux/kernel.h>\n#include <linux/if_arp.h>\n#include <linux/wireless.h>\n#include <linux/ieee80211.h>\n#include <net/iw_handler.h>\n#include <net/cfg80211.h>",
"#include \"hermes.h\"\n#include \"hermes... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [918], "buggy_code_start_loc": [914], "filenames": ["drivers/net/wireless/orinoco/wext.c"], "fixing_code_end_loc": [918], "fixing_code_start_loc": [914], "message": "The orinoco_ioctl_set_auth function in drivers/net/wireless/orinoco/wext.c in the Linux kernel before 2.6.37 does not properly impl... | 235 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* Wireless extensions support.\n *\n * See copyright notice in main.c\n */\n#include <linux/slab.h>\n#include <linux/kernel.h>\n#include <linux/if_arp.h>\n#include <linux/wireless.h>\n#include <linux/ieee80211.h>\n#include <net/iw_handler.h>\n#include <net/cfg80211.h>",
"#include \"hermes.h\"\n#include \"hermes... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [918], "buggy_code_start_loc": [914], "filenames": ["drivers/net/wireless/orinoco/wext.c"], "fixing_code_end_loc": [918], "fixing_code_start_loc": [914], "message": "The orinoco_ioctl_set_auth function in drivers/net/wireless/orinoco/wext.c in the Linux kernel before 2.6.37 does not properly impl... | 235 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*! @file GPMF_parser.c\n * \n * @brief GPMF Parser library\n *",
" * @version 1.2.1",
" * \n * (C) Copyright 2017 GoPro Inc (http://gopro.com/).\n *\t\n * Licensed under either:\n * - Apache License, Version 2.0, http://www.apache.org/licenses/LICENSE-2.0 \n * - MIT license, http://opensource.org/licen... | [
1,
0,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [46, 130, 244, 971, 114], "buggy_code_start_loc": [5, 5, 48, 5, 66], "filenames": ["GPMF_parser.c", "GPMF_parser.h", "demo/GPMF_demo.c", "demo/GPMF_mp4reader.c", "demo/GPMF_mp4reader.h"], "fixing_code_end_loc": [46, 134, 251, 1131, 115], "fixing_code_start_loc": [5, 5, 49, 5, 67], "message": "GoP... | 236 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*! @file GPMF_parser.c\n * \n * @brief GPMF Parser library\n *",
" * @version 1.2.2",
" * \n * (C) Copyright 2017 GoPro Inc (http://gopro.com/).\n *\t\n * Licensed under either:\n * - Apache License, Version 2.0, http://www.apache.org/licenses/LICENSE-2.0 \n * - MIT license, http://opensource.org/licen... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [46, 130, 244, 971, 114], "buggy_code_start_loc": [5, 5, 48, 5, 66], "filenames": ["GPMF_parser.c", "GPMF_parser.h", "demo/GPMF_demo.c", "demo/GPMF_mp4reader.c", "demo/GPMF_mp4reader.h"], "fixing_code_end_loc": [46, 134, 251, 1131, 115], "fixing_code_start_loc": [5, 5, 49, 5, 67], "message": "GoP... | 236 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*! @file GPMF_parser.h\n * \n * @brief GPMF Parser library include\n * ",
" * @version 1.1.0",
" * \n * (C) Copyright 2017 GoPro Inc (http://gopro.com/).\n *\t\n * Licensed under either:\n * - Apache License, Version 2.0, http://www.apache.org/licenses/LICENSE-2.0 \n * - MIT license, http://opensource.... | [
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [46, 130, 244, 971, 114], "buggy_code_start_loc": [5, 5, 48, 5, 66], "filenames": ["GPMF_parser.c", "GPMF_parser.h", "demo/GPMF_demo.c", "demo/GPMF_mp4reader.c", "demo/GPMF_mp4reader.h"], "fixing_code_end_loc": [46, 134, 251, 1131, 115], "fixing_code_start_loc": [5, 5, 49, 5, 67], "message": "GoP... | 236 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*! @file GPMF_parser.h\n * \n * @brief GPMF Parser library include\n * ",
" * @version 1.1.1",
" * \n * (C) Copyright 2017 GoPro Inc (http://gopro.com/).\n *\t\n * Licensed under either:\n * - Apache License, Version 2.0, http://www.apache.org/licenses/LICENSE-2.0 \n * - MIT license, http://opensource.... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [46, 130, 244, 971, 114], "buggy_code_start_loc": [5, 5, 48, 5, 66], "filenames": ["GPMF_parser.c", "GPMF_parser.h", "demo/GPMF_demo.c", "demo/GPMF_mp4reader.c", "demo/GPMF_mp4reader.h"], "fixing_code_end_loc": [46, 134, 251, 1131, 115], "fixing_code_start_loc": [5, 5, 49, 5, 67], "message": "GoP... | 236 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*! @file GPMF_demo.c\n *\n * @brief Demo to extract GPMF from an MP4\n *\n * @version 1.0.1\n *\n * (C) Copyright 2017 GoPro Inc (http://gopro.com/).\n *\t\n * Licensed under either:\n * - Apache License, Version 2.0, http://www.apache.org/licenses/LICENSE-2.0 \n * - MIT license, http://opensource.org/lice... | [
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [46, 130, 244, 971, 114], "buggy_code_start_loc": [5, 5, 48, 5, 66], "filenames": ["GPMF_parser.c", "GPMF_parser.h", "demo/GPMF_demo.c", "demo/GPMF_mp4reader.c", "demo/GPMF_mp4reader.h"], "fixing_code_end_loc": [46, 134, 251, 1131, 115], "fixing_code_start_loc": [5, 5, 49, 5, 67], "message": "GoP... | 236 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*! @file GPMF_demo.c\n *\n * @brief Demo to extract GPMF from an MP4\n *\n * @version 1.0.1\n *\n * (C) Copyright 2017 GoPro Inc (http://gopro.com/).\n *\t\n * Licensed under either:\n * - Apache License, Version 2.0, http://www.apache.org/licenses/LICENSE-2.0 \n * - MIT license, http://opensource.org/lice... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [46, 130, 244, 971, 114], "buggy_code_start_loc": [5, 5, 48, 5, 66], "filenames": ["GPMF_parser.c", "GPMF_parser.h", "demo/GPMF_demo.c", "demo/GPMF_mp4reader.c", "demo/GPMF_mp4reader.h"], "fixing_code_end_loc": [46, 134, 251, 1131, 115], "fixing_code_start_loc": [5, 5, 49, 5, 67], "message": "GoP... | 236 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*! @file mp4reader.c\n*\n* @brief Way Too Crude MP4|MOV reader\n*",
"* @version 1.2.1",
"*",
"* (C) Copyright 2017 GoPro Inc (http://gopro.com/).",
"*",
"* Licensed under the Apache License, Version 2.0 (the \"License\");\n* you may not use this file except in compliance with the License.\n* You m... | [
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
0,
1,
1,
1,
0,
1,
1,
0,
1,
0,
0,
1,
0,
1,
0,
1,
0,
1,
1,
1,
1,
0,
1,
1,
1,
0,
1,
1,
0,
1,
0,
1,
0,
0,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [46, 130, 244, 971, 114], "buggy_code_start_loc": [5, 5, 48, 5, 66], "filenames": ["GPMF_parser.c", "GPMF_parser.h", "demo/GPMF_demo.c", "demo/GPMF_mp4reader.c", "demo/GPMF_mp4reader.h"], "fixing_code_end_loc": [46, 134, 251, 1131, 115], "fixing_code_start_loc": [5, 5, 49, 5, 67], "message": "GoP... | 236 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*! @file mp4reader.c\n*\n* @brief Way Too Crude MP4|MOV reader\n*",
"* @version 1.3.1",
"*",
"* (C) Copyright 2017-2019 GoPro Inc (http://gopro.com/).",
"*",
"* Licensed under either:\n* - Apache License, Version 2.0, http://www.apache.org/licenses/LICENSE-2.0\n* - MIT license, http://opensource.o... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [46, 130, 244, 971, 114], "buggy_code_start_loc": [5, 5, 48, 5, 66], "filenames": ["GPMF_parser.c", "GPMF_parser.h", "demo/GPMF_demo.c", "demo/GPMF_mp4reader.c", "demo/GPMF_mp4reader.h"], "fixing_code_end_loc": [46, 134, 251, 1131, 115], "fixing_code_start_loc": [5, 5, 49, 5, 67], "message": "GoP... | 236 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*! @file mp4reader.h\n*\n* @brief Way Too Crude MP4|MOV reader\n*\n* @version 1.2.0\n*\n* (C) Copyright 2017 GoPro Inc (http://gopro.com/).\n*\n* Licensed under the Apache License, Version 2.0 (the \"License\");\n* you may not use this file except in compliance with the License.\n* You may obtain a copy of ... | [
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
0,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [46, 130, 244, 971, 114], "buggy_code_start_loc": [5, 5, 48, 5, 66], "filenames": ["GPMF_parser.c", "GPMF_parser.h", "demo/GPMF_demo.c", "demo/GPMF_mp4reader.c", "demo/GPMF_mp4reader.h"], "fixing_code_end_loc": [46, 134, 251, 1131, 115], "fixing_code_start_loc": [5, 5, 49, 5, 67], "message": "GoP... | 236 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*! @file mp4reader.h\n*\n* @brief Way Too Crude MP4|MOV reader\n*\n* @version 1.2.0\n*\n* (C) Copyright 2017 GoPro Inc (http://gopro.com/).\n*\n* Licensed under the Apache License, Version 2.0 (the \"License\");\n* you may not use this file except in compliance with the License.\n* You may obtain a copy of ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [46, 130, 244, 971, 114], "buggy_code_start_loc": [5, 5, 48, 5, 66], "filenames": ["GPMF_parser.c", "GPMF_parser.h", "demo/GPMF_demo.c", "demo/GPMF_mp4reader.c", "demo/GPMF_mp4reader.h"], "fixing_code_end_loc": [46, 134, 251, 1131, 115], "fixing_code_start_loc": [5, 5, 49, 5, 67], "message": "GoP... | 236 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n//----------------------------------------------------------------------\n// Copyright (c) 2011-2016 Raytheon BBN Technologies\n//\n// Permission is hereby granted, free of charge, to any person obtaining\n// a copy of this software and/or hardware specification (the \"Work\") to\n// deal in the Work withou... | [
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [64], "buggy_code_start_loc": [64], "filenames": ["portal/www/portal/sliceresource.php"], "fixing_code_end_loc": [69], "fixing_code_start_loc": [65], "message": "A vulnerability classified as problematic has been found in GENI Portal. This affects the function no_invocation_id_error of the file p... | 237 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n//----------------------------------------------------------------------\n// Copyright (c) 2011-2016 Raytheon BBN Technologies\n//\n// Permission is hereby granted, free of charge, to any person obtaining\n// a copy of this software and/or hardware specification (the \"Work\") to\n// deal in the Work withou... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [64], "buggy_code_start_loc": [64], "filenames": ["portal/www/portal/sliceresource.php"], "fixing_code_end_loc": [69], "fixing_code_start_loc": [65], "message": "A vulnerability classified as problematic has been found in GENI Portal. This affects the function no_invocation_id_error of the file p... | 237 |
Determine whether the {function_name} code is vulnerable or not. | [
"/**\n * Copyright (c) 2015 by Contributors\n */\n#ifndef PS_ZMQ_VAN_H_\n#define PS_ZMQ_VAN_H_\n#include <zmq.h>\n#include <stdlib.h>\n#include <thread>\n#include <string>\n#include \"ps/internal/van.h\"\n#if _MSC_VER\n#define rand_r(x) rand()\n#endif",
"namespace ps {\n/**\n * \\brief be smart on freeing recved... | [
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [67], "buggy_code_start_loc": [66], "filenames": ["src/zmq_van.h"], "fixing_code_end_loc": [68], "fixing_code_start_loc": [66], "message": "The clustered setup of Apache MXNet allows users to specify which IP address and port the scheduler will listen on via the DMLC_PS_ROOT_URI and DMLC_PS_ROOT_... | 238 |
Determine whether the {function_name} code is vulnerable or not. | [
"/**\n * Copyright (c) 2015 by Contributors\n */\n#ifndef PS_ZMQ_VAN_H_\n#define PS_ZMQ_VAN_H_\n#include <zmq.h>\n#include <stdlib.h>\n#include <thread>\n#include <string>\n#include \"ps/internal/van.h\"\n#if _MSC_VER\n#define rand_r(x) rand()\n#endif",
"namespace ps {\n/**\n * \\brief be smart on freeing recved... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [67], "buggy_code_start_loc": [66], "filenames": ["src/zmq_van.h"], "fixing_code_end_loc": [68], "fixing_code_start_loc": [66], "message": "The clustered setup of Apache MXNet allows users to specify which IP address and port the scheduler will listen on via the DMLC_PS_ROOT_URI and DMLC_PS_ROOT_... | 238 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2009-2020, Salvatore Sanfilippo <antirez at gmail dot com>\n * Copyright (c) 2020, Redis Labs, Inc\n * All rights reserved.\n *\n * Redistribution and use in source and binary forms, with or without\n * modification, are permitted provided that the following conditions are met:\n *\n * * Red... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [2083], "buggy_code_start_loc": [1126], "filenames": ["src/debug.c"], "fixing_code_end_loc": [2119], "fixing_code_start_loc": [1126], "message": "** DISPUTED ** A vulnerability, which was classified as problematic, was found in Redis. Affected is the function sigsegvHandler of the file debug.c of... | 239 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2009-2020, Salvatore Sanfilippo <antirez at gmail dot com>\n * Copyright (c) 2020, Redis Labs, Inc\n * All rights reserved.\n *\n * Redistribution and use in source and binary forms, with or without\n * modification, are permitted provided that the following conditions are met:\n *\n * * Red... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [2083], "buggy_code_start_loc": [1126], "filenames": ["src/debug.c"], "fixing_code_end_loc": [2119], "fixing_code_start_loc": [1126], "message": "** DISPUTED ** A vulnerability, which was classified as problematic, was found in Redis. Affected is the function sigsegvHandler of the file debug.c of... | 239 |
Determine whether the {function_name} code is vulnerable or not. | [
"# Security Policy",
"The development team and community take all security issues seriously. **Please do not make public any uncovered flaws.**",
"## Reporting a Vulnerability",
"Thank you for improving the security of our code! Any assistance in removing security flaws will be acknowledged.",
"**Please rep... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [22, 818, 313, 129, 10], "buggy_code_start_loc": [22, 813, 304, 110, 10], "filenames": ["SECURITY.md", "system/Common.php", "tests/system/CommonFunctionsTest.php", "tests/system/HTTP/IncomingRequestTest.php", "user_guide_src/source/changelogs/v4.1.6.rst"], "fixing_code_end_loc": [24, 812, 346, 13... | 240 |
Determine whether the {function_name} code is vulnerable or not. | [
"# Security Policy",
"The development team and community take all security issues seriously. **Please do not make public any uncovered flaws.**",
"## Reporting a Vulnerability",
"Thank you for improving the security of our code! Any assistance in removing security flaws will be acknowledged.",
"**Please rep... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [22, 818, 313, 129, 10], "buggy_code_start_loc": [22, 813, 304, 110, 10], "filenames": ["SECURITY.md", "system/Common.php", "tests/system/CommonFunctionsTest.php", "tests/system/HTTP/IncomingRequestTest.php", "user_guide_src/source/changelogs/v4.1.6.rst"], "fixing_code_end_loc": [24, 812, 346, 13... | 240 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/**\n * This file is part of CodeIgniter 4 framework.\n *\n * (c) CodeIgniter Foundation <admin@codeigniter.com>\n *\n * For the full copyright and license information, please view\n * the LICENSE file that was distributed with this source code.\n */",
"use CodeIgniter\\Cache\\CacheInterface;\nuse Cod... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [22, 818, 313, 129, 10], "buggy_code_start_loc": [22, 813, 304, 110, 10], "filenames": ["SECURITY.md", "system/Common.php", "tests/system/CommonFunctionsTest.php", "tests/system/HTTP/IncomingRequestTest.php", "user_guide_src/source/changelogs/v4.1.6.rst"], "fixing_code_end_loc": [24, 812, 346, 13... | 240 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/**\n * This file is part of CodeIgniter 4 framework.\n *\n * (c) CodeIgniter Foundation <admin@codeigniter.com>\n *\n * For the full copyright and license information, please view\n * the LICENSE file that was distributed with this source code.\n */",
"use CodeIgniter\\Cache\\CacheInterface;\nuse Cod... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [22, 818, 313, 129, 10], "buggy_code_start_loc": [22, 813, 304, 110, 10], "filenames": ["SECURITY.md", "system/Common.php", "tests/system/CommonFunctionsTest.php", "tests/system/HTTP/IncomingRequestTest.php", "user_guide_src/source/changelogs/v4.1.6.rst"], "fixing_code_end_loc": [24, 812, 346, 13... | 240 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/**\n * This file is part of CodeIgniter 4 framework.\n *\n * (c) CodeIgniter Foundation <admin@codeigniter.com>\n *\n * For the full copyright and license information, please view\n * the LICENSE file that was distributed with this source code.\n */",
"namespace CodeIgniter;",
"use CodeIgniter\\Con... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
0,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [22, 818, 313, 129, 10], "buggy_code_start_loc": [22, 813, 304, 110, 10], "filenames": ["SECURITY.md", "system/Common.php", "tests/system/CommonFunctionsTest.php", "tests/system/HTTP/IncomingRequestTest.php", "user_guide_src/source/changelogs/v4.1.6.rst"], "fixing_code_end_loc": [24, 812, 346, 13... | 240 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/**\n * This file is part of CodeIgniter 4 framework.\n *\n * (c) CodeIgniter Foundation <admin@codeigniter.com>\n *\n * For the full copyright and license information, please view\n * the LICENSE file that was distributed with this source code.\n */",
"namespace CodeIgniter;",
"use CodeIgniter\\Con... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [22, 818, 313, 129, 10], "buggy_code_start_loc": [22, 813, 304, 110, 10], "filenames": ["SECURITY.md", "system/Common.php", "tests/system/CommonFunctionsTest.php", "tests/system/HTTP/IncomingRequestTest.php", "user_guide_src/source/changelogs/v4.1.6.rst"], "fixing_code_end_loc": [24, 812, 346, 13... | 240 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/**\n * This file is part of CodeIgniter 4 framework.\n *\n * (c) CodeIgniter Foundation <admin@codeigniter.com>\n *\n * For the full copyright and license information, please view\n * the LICENSE file that was distributed with this source code.\n */",
"namespace CodeIgniter\\HTTP;",
"use CodeIgnite... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
0,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [22, 818, 313, 129, 10], "buggy_code_start_loc": [22, 813, 304, 110, 10], "filenames": ["SECURITY.md", "system/Common.php", "tests/system/CommonFunctionsTest.php", "tests/system/HTTP/IncomingRequestTest.php", "user_guide_src/source/changelogs/v4.1.6.rst"], "fixing_code_end_loc": [24, 812, 346, 13... | 240 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/**\n * This file is part of CodeIgniter 4 framework.\n *\n * (c) CodeIgniter Foundation <admin@codeigniter.com>\n *\n * For the full copyright and license information, please view\n * the LICENSE file that was distributed with this source code.\n */",
"namespace CodeIgniter\\HTTP;",
"use CodeIgnite... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [22, 818, 313, 129, 10], "buggy_code_start_loc": [22, 813, 304, 110, 10], "filenames": ["SECURITY.md", "system/Common.php", "tests/system/CommonFunctionsTest.php", "tests/system/HTTP/IncomingRequestTest.php", "user_guide_src/source/changelogs/v4.1.6.rst"], "fixing_code_end_loc": [24, 812, 346, 13... | 240 |
Determine whether the {function_name} code is vulnerable or not. | [
"Version 4.1.6\n#############",
"Release Date: Not released",
"**4.1.6 release of CodeIgniter4**",
".. contents::\n :local:\n :depth: 2",
"",
"\nBREAKING\n********",
"- Multiple table names will no longer be stored in ``BaseBuilder::$tableName`` - an empty string will be used instead.",
".. _cha... | [
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [22, 818, 313, 129, 10], "buggy_code_start_loc": [22, 813, 304, 110, 10], "filenames": ["SECURITY.md", "system/Common.php", "tests/system/CommonFunctionsTest.php", "tests/system/HTTP/IncomingRequestTest.php", "user_guide_src/source/changelogs/v4.1.6.rst"], "fixing_code_end_loc": [24, 812, 346, 13... | 240 |
Determine whether the {function_name} code is vulnerable or not. | [
"Version 4.1.6\n#############",
"Release Date: Not released",
"**4.1.6 release of CodeIgniter4**",
".. contents::\n :local:\n :depth: 2",
"\nSECURITY\n********",
"- *Deserialization of Untrusted Data* found in the ``old()`` function was fixed. See the `Security advisory <https://github.com/codeignit... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [22, 818, 313, 129, 10], "buggy_code_start_loc": [22, 813, 304, 110, 10], "filenames": ["SECURITY.md", "system/Common.php", "tests/system/CommonFunctionsTest.php", "tests/system/HTTP/IncomingRequestTest.php", "user_guide_src/source/changelogs/v4.1.6.rst"], "fixing_code_end_loc": [24, 812, 346, 13... | 240 |
Determine whether the {function_name} code is vulnerable or not. | [
"# -*- coding: utf-8 -*-\n# ____________\n# ___/ | \\_____________ _ _ ___\n# / ___/ | _ __ _ _| | ___ __ _ __| | \\\n# / \\___/ ______/ | '_ \\ || | |__/ _ \\/ _` / _` | \\\n# \\ ◯ | | .__/\\_, |____\\___/\\__,_\\__,_| /\n# \\_______... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [104], "buggy_code_start_loc": [81], "filenames": ["src/pyload/webui/app/__init__.py"], "fixing_code_end_loc": [106], "fixing_code_start_loc": [81], "message": "Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in GitHub repository pyload/pyload prior to 0.5.0b3.dev32.", "other": {"cve... | 241 |
Determine whether the {function_name} code is vulnerable or not. | [
"# -*- coding: utf-8 -*-\n# ____________\n# ___/ | \\_____________ _ _ ___\n# / ___/ | _ __ _ _| | ___ __ _ __| | \\\n# / \\___/ ______/ | '_ \\ || | |__/ _ \\/ _` / _` | \\\n# \\ ◯ | | .__/\\_, |____\\___/\\__,_\\__,_| /\n# \\_______... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [104], "buggy_code_start_loc": [81], "filenames": ["src/pyload/webui/app/__init__.py"], "fixing_code_end_loc": [106], "fixing_code_start_loc": [81], "message": "Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in GitHub repository pyload/pyload prior to 0.5.0b3.dev32.", "other": {"cve... | 241 |
Determine whether the {function_name} code is vulnerable or not. | [
"import { useEffect, useState, useRef } from \"react\";\nimport { useTranslation } from \"react-i18next\";\nimport { useLocationStore, useDialogStore } from \"../store/module\";\nimport { memoSpecialTypes } from \"../helpers/filter\";\nimport Icon from \"./Icon\";\nimport \"../less/search-bar.less\";",
"const Sea... | [
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [42, 25, 18, 18, 18, 21], "buggy_code_start_loc": [41, 1, 0, 0, 0, 20], "filenames": ["web/src/components/SearchBar.tsx", "web/src/labs/highlighter/index.ts", "web/src/labs/marked/parser/Bold.ts", "web/src/labs/marked/parser/BoldEmphasis.ts", "web/src/labs/marked/parser/Emphasis.ts", "web/src/lab... | 242 |
Determine whether the {function_name} code is vulnerable or not. | [
"import { useEffect, useState, useRef } from \"react\";\nimport { useTranslation } from \"react-i18next\";\nimport { useLocationStore, useDialogStore } from \"../store/module\";\nimport { memoSpecialTypes } from \"../helpers/filter\";\nimport Icon from \"./Icon\";\nimport \"../less/search-bar.less\";",
"const Sea... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [42, 25, 18, 18, 18, 21], "buggy_code_start_loc": [41, 1, 0, 0, 0, 20], "filenames": ["web/src/components/SearchBar.tsx", "web/src/labs/highlighter/index.ts", "web/src/labs/marked/parser/Bold.ts", "web/src/labs/marked/parser/BoldEmphasis.ts", "web/src/labs/marked/parser/Emphasis.ts", "web/src/lab... | 242 |
Determine whether the {function_name} code is vulnerable or not. | [
"const escapeRegExp = (str: string): string => {\n return str.replace(/[.*+?^${}()|[\\]\\\\]/g, \"\\\\$&\");\n};",
"\nconst walkthroughNodeWithKeyword = (node: HTMLElement, keyword: string) => {\n if (node.nodeType === 3) {\n const span = document.createElement(\"span\");\n span.innerHTML = node.nodeValue... | [
0,
1,
1,
0,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [42, 25, 18, 18, 18, 21], "buggy_code_start_loc": [41, 1, 0, 0, 0, 20], "filenames": ["web/src/components/SearchBar.tsx", "web/src/labs/highlighter/index.ts", "web/src/labs/marked/parser/Bold.ts", "web/src/labs/marked/parser/BoldEmphasis.ts", "web/src/labs/marked/parser/Emphasis.ts", "web/src/lab... | 242 |
Determine whether the {function_name} code is vulnerable or not. | [
"import { escape } from \"lodash\";",
"\nconst walkthroughNodeWithKeyword = (node: HTMLElement, keyword: string) => {\n if (node.nodeType === 3) {\n const span = document.createElement(\"span\");\n span.innerHTML = node.nodeValue?.replace(new RegExp(keyword, \"g\"), `<mark>${keyword}</mark>`) ?? \"\";\n ... | [
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [42, 25, 18, 18, 18, 21], "buggy_code_start_loc": [41, 1, 0, 0, 0, 20], "filenames": ["web/src/components/SearchBar.tsx", "web/src/labs/highlighter/index.ts", "web/src/labs/marked/parser/Bold.ts", "web/src/labs/marked/parser/BoldEmphasis.ts", "web/src/labs/marked/parser/Emphasis.ts", "web/src/lab... | 242 |
Determine whether the {function_name} code is vulnerable or not. | [
"",
"import { marked } from \"..\";\nimport Link from \"./Link\";",
"export const BOLD_REG = /\\*\\*(.+?)\\*\\*/;",
"const matcher = (rawStr: string) => {\n const matchResult = rawStr.match(BOLD_REG);\n return matchResult;\n};",
"const renderer = (rawStr: string): string => {\n const matchResult = matche... | [
0,
1,
1,
1,
1,
0,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [42, 25, 18, 18, 18, 21], "buggy_code_start_loc": [41, 1, 0, 0, 0, 20], "filenames": ["web/src/components/SearchBar.tsx", "web/src/labs/highlighter/index.ts", "web/src/labs/marked/parser/Bold.ts", "web/src/labs/marked/parser/BoldEmphasis.ts", "web/src/labs/marked/parser/Emphasis.ts", "web/src/lab... | 242 |
Determine whether the {function_name} code is vulnerable or not. | [
"import { escape } from \"lodash\";",
"import { marked } from \"..\";\nimport Link from \"./Link\";",
"export const BOLD_REG = /\\*\\*(.+?)\\*\\*/;",
"const matcher = (rawStr: string) => {\n const matchResult = rawStr.match(BOLD_REG);\n return matchResult;\n};",
"const renderer = (rawStr: string): string ... | [
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [42, 25, 18, 18, 18, 21], "buggy_code_start_loc": [41, 1, 0, 0, 0, 20], "filenames": ["web/src/components/SearchBar.tsx", "web/src/labs/highlighter/index.ts", "web/src/labs/marked/parser/Bold.ts", "web/src/labs/marked/parser/BoldEmphasis.ts", "web/src/labs/marked/parser/Emphasis.ts", "web/src/lab... | 242 |
Determine whether the {function_name} code is vulnerable or not. | [
"",
"import { marked } from \"..\";\nimport Link from \"./Link\";",
"export const BOLD_EMPHASIS_REG = /\\*\\*\\*(.+?)\\*\\*\\*/;",
"const matcher = (rawStr: string) => {\n const matchResult = rawStr.match(BOLD_EMPHASIS_REG);\n return matchResult;\n};",
"const renderer = (rawStr: string): string => {\n co... | [
0,
1,
1,
1,
1,
0,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [42, 25, 18, 18, 18, 21], "buggy_code_start_loc": [41, 1, 0, 0, 0, 20], "filenames": ["web/src/components/SearchBar.tsx", "web/src/labs/highlighter/index.ts", "web/src/labs/marked/parser/Bold.ts", "web/src/labs/marked/parser/BoldEmphasis.ts", "web/src/labs/marked/parser/Emphasis.ts", "web/src/lab... | 242 |
Determine whether the {function_name} code is vulnerable or not. | [
"import { escape } from \"lodash\";",
"import { marked } from \"..\";\nimport Link from \"./Link\";",
"export const BOLD_EMPHASIS_REG = /\\*\\*\\*(.+?)\\*\\*\\*/;",
"const matcher = (rawStr: string) => {\n const matchResult = rawStr.match(BOLD_EMPHASIS_REG);\n return matchResult;\n};",
"const renderer = (... | [
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [42, 25, 18, 18, 18, 21], "buggy_code_start_loc": [41, 1, 0, 0, 0, 20], "filenames": ["web/src/components/SearchBar.tsx", "web/src/labs/highlighter/index.ts", "web/src/labs/marked/parser/Bold.ts", "web/src/labs/marked/parser/BoldEmphasis.ts", "web/src/labs/marked/parser/Emphasis.ts", "web/src/lab... | 242 |
Determine whether the {function_name} code is vulnerable or not. | [
"",
"import { marked } from \"..\";\nimport Link from \"./Link\";",
"export const EMPHASIS_REG = /\\*(.+?)\\*/;",
"const matcher = (rawStr: string) => {\n const matchResult = rawStr.match(EMPHASIS_REG);\n return matchResult;\n};",
"const renderer = (rawStr: string): string => {\n const matchResult = matc... | [
0,
1,
1,
1,
1,
0,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [42, 25, 18, 18, 18, 21], "buggy_code_start_loc": [41, 1, 0, 0, 0, 20], "filenames": ["web/src/components/SearchBar.tsx", "web/src/labs/highlighter/index.ts", "web/src/labs/marked/parser/Bold.ts", "web/src/labs/marked/parser/BoldEmphasis.ts", "web/src/labs/marked/parser/Emphasis.ts", "web/src/lab... | 242 |
Determine whether the {function_name} code is vulnerable or not. | [
"import { escape } from \"lodash\";",
"import { marked } from \"..\";\nimport Link from \"./Link\";",
"export const EMPHASIS_REG = /\\*(.+?)\\*/;",
"const matcher = (rawStr: string) => {\n const matchResult = rawStr.match(EMPHASIS_REG);\n return matchResult;\n};",
"const renderer = (rawStr: string): strin... | [
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [42, 25, 18, 18, 18, 21], "buggy_code_start_loc": [41, 1, 0, 0, 0, 20], "filenames": ["web/src/components/SearchBar.tsx", "web/src/labs/highlighter/index.ts", "web/src/labs/marked/parser/Bold.ts", "web/src/labs/marked/parser/BoldEmphasis.ts", "web/src/labs/marked/parser/Emphasis.ts", "web/src/lab... | 242 |
Determine whether the {function_name} code is vulnerable or not. | [
"import { escape } from \"lodash-es\";\nimport Emphasis from \"./Emphasis\";\nimport Bold from \"./Bold\";\nimport { marked } from \"..\";\nimport InlineCode from \"./InlineCode\";\nimport BoldEmphasis from \"./BoldEmphasis\";",
"export const LINK_REG = /\\[(.*?)\\]\\((.+?)\\)+/;",
"const matcher = (rawStr: str... | [
1,
1,
1,
1,
0,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [42, 25, 18, 18, 18, 21], "buggy_code_start_loc": [41, 1, 0, 0, 0, 20], "filenames": ["web/src/components/SearchBar.tsx", "web/src/labs/highlighter/index.ts", "web/src/labs/marked/parser/Bold.ts", "web/src/labs/marked/parser/BoldEmphasis.ts", "web/src/labs/marked/parser/Emphasis.ts", "web/src/lab... | 242 |
Determine whether the {function_name} code is vulnerable or not. | [
"import { escape } from \"lodash-es\";\nimport Emphasis from \"./Emphasis\";\nimport Bold from \"./Bold\";\nimport { marked } from \"..\";\nimport InlineCode from \"./InlineCode\";\nimport BoldEmphasis from \"./BoldEmphasis\";",
"export const LINK_REG = /\\[(.*?)\\]\\((.+?)\\)+/;",
"const matcher = (rawStr: str... | [
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [42, 25, 18, 18, 18, 21], "buggy_code_start_loc": [41, 1, 0, 0, 0, 20], "filenames": ["web/src/components/SearchBar.tsx", "web/src/labs/highlighter/index.ts", "web/src/labs/marked/parser/Bold.ts", "web/src/labs/marked/parser/BoldEmphasis.ts", "web/src/labs/marked/parser/Emphasis.ts", "web/src/lab... | 242 |
Determine whether the {function_name} code is vulnerable or not. | [
"======= 3.4.9",
"- fixed measuring dimension for `.gif` images",
"",
"\n======= 3.4.7",
"- fixed: command injection in `Image.pipe()` and `Image.stream()`\n- fixed `DELETE` method for the schemas (now it works like `PATCH` method)\n- fixed: `controller.transfer()`",
"======= 3.4.6",
"- added: a support... | [
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [3, 6627], "buggy_code_start_loc": [3, 6625], "filenames": ["changes.txt", "utils.js"], "fixing_code_end_loc": [5, 6627], "fixing_code_start_loc": [4, 6625], "message": "The package total.js before 3.4.8 are vulnerable to Remote Code Execution (RCE) via set.", "other": {"cve": {"cisaActionDue": n... | 243 |
Determine whether the {function_name} code is vulnerable or not. | [
"======= 3.4.9",
"- fixed measuring dimension for `.gif` images",
"- fixed potential remote code execution in `U.set()` founded by [Snyk](https://snyk.io/vuln)",
"\n======= 3.4.7",
"- fixed: command injection in `Image.pipe()` and `Image.stream()`\n- fixed `DELETE` method for the schemas (now it works like ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [3, 6627], "buggy_code_start_loc": [3, 6625], "filenames": ["changes.txt", "utils.js"], "fixing_code_end_loc": [5, 6627], "fixing_code_start_loc": [4, 6625], "message": "The package total.js before 3.4.8 are vulnerable to Remote Code Execution (RCE) via set.", "other": {"cve": {"cisaActionDue": n... | 243 |
Determine whether the {function_name} code is vulnerable or not. | [
"// Copyright 2012-2020 (c) Peter Širka <petersirka@gmail.com>\n//\n// Permission is hereby granted, free of charge, to any person obtaining a\n// copy of this software and associated documentation files (the\n// \"Software\"), to deal in the Software without restriction, including\n// without limitation the rights... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [3, 6627], "buggy_code_start_loc": [3, 6625], "filenames": ["changes.txt", "utils.js"], "fixing_code_end_loc": [5, 6627], "fixing_code_start_loc": [4, 6625], "message": "The package total.js before 3.4.8 are vulnerable to Remote Code Execution (RCE) via set.", "other": {"cve": {"cisaActionDue": n... | 243 |
Determine whether the {function_name} code is vulnerable or not. | [
"// Copyright 2012-2020 (c) Peter Širka <petersirka@gmail.com>\n//\n// Permission is hereby granted, free of charge, to any person obtaining a\n// copy of this software and associated documentation files (the\n// \"Software\"), to deal in the Software without restriction, including\n// without limitation the rights... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [3, 6627], "buggy_code_start_loc": [3, 6625], "filenames": ["changes.txt", "utils.js"], "fixing_code_end_loc": [5, 6627], "fixing_code_start_loc": [4, 6625], "message": "The package total.js before 3.4.8 are vulnerable to Remote Code Execution (RCE) via set.", "other": {"cve": {"cisaActionDue": n... | 243 |
Determine whether the {function_name} code is vulnerable or not. | [
"# Sidekiq Changes",
"[Sidekiq Changes](https://github.com/sidekiq/sidekiq/blob/main/Changes.md) | [Sidekiq Pro Changes](https://github.com/sidekiq/sidekiq/blob/main/Pro-Changes.md) | [Sidekiq Enterprise Changes](https://github.com/sidekiq/sidekiq/blob/main/Ent-Changes.md)\n",
"HEAD",
"----------\n",
"- Add... | [
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [9, 5, 81], "buggy_code_start_loc": [5, 4, 71], "filenames": ["Changes.md", "lib/sidekiq/version.rb", "lib/sidekiq/web/application.rb"], "fixing_code_end_loc": [12, 5, 81], "fixing_code_start_loc": [5, 4, 71], "message": "Cross-site Scripting (XSS) - Reflected in GitHub repository sidekiq/sidekiq... | 244 |
Determine whether the {function_name} code is vulnerable or not. | [
"# Sidekiq Changes",
"[Sidekiq Changes](https://github.com/sidekiq/sidekiq/blob/main/Changes.md) | [Sidekiq Pro Changes](https://github.com/sidekiq/sidekiq/blob/main/Pro-Changes.md) | [Sidekiq Enterprise Changes](https://github.com/sidekiq/sidekiq/blob/main/Ent-Changes.md)\n",
"7.0.8",
"----------\n",
"- **... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [9, 5, 81], "buggy_code_start_loc": [5, 4, 71], "filenames": ["Changes.md", "lib/sidekiq/version.rb", "lib/sidekiq/web/application.rb"], "fixing_code_end_loc": [12, 5, 81], "fixing_code_start_loc": [5, 4, 71], "message": "Cross-site Scripting (XSS) - Reflected in GitHub repository sidekiq/sidekiq... | 244 |
Determine whether the {function_name} code is vulnerable or not. | [
"# frozen_string_literal: true",
"module Sidekiq",
" VERSION = \"7.0.7\"",
" MAJOR = 7\nend"
] | [
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [9, 5, 81], "buggy_code_start_loc": [5, 4, 71], "filenames": ["Changes.md", "lib/sidekiq/version.rb", "lib/sidekiq/web/application.rb"], "fixing_code_end_loc": [12, 5, 81], "fixing_code_start_loc": [5, 4, 71], "message": "Cross-site Scripting (XSS) - Reflected in GitHub repository sidekiq/sidekiq... | 244 |
Determine whether the {function_name} code is vulnerable or not. | [
"# frozen_string_literal: true",
"module Sidekiq",
" VERSION = \"7.0.8\"",
" MAJOR = 7\nend"
] | [
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [9, 5, 81], "buggy_code_start_loc": [5, 4, 71], "filenames": ["Changes.md", "lib/sidekiq/version.rb", "lib/sidekiq/web/application.rb"], "fixing_code_end_loc": [12, 5, 81], "fixing_code_start_loc": [5, 4, 71], "message": "Cross-site Scripting (XSS) - Reflected in GitHub repository sidekiq/sidekiq... | 244 |
Determine whether the {function_name} code is vulnerable or not. | [
"# frozen_string_literal: true",
"module Sidekiq\n class WebApplication\n extend WebRouter",
" REDIS_KEYS = %w[redis_version uptime_in_days connected_clients used_memory_human used_memory_peak_human]\n CSP_HEADER = [\n \"default-src 'self' https: http:\",\n \"child-src 'self'\",\n \"con... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [9, 5, 81], "buggy_code_start_loc": [5, 4, 71], "filenames": ["Changes.md", "lib/sidekiq/version.rb", "lib/sidekiq/web/application.rb"], "fixing_code_end_loc": [12, 5, 81], "fixing_code_start_loc": [5, 4, 71], "message": "Cross-site Scripting (XSS) - Reflected in GitHub repository sidekiq/sidekiq... | 244 |
Determine whether the {function_name} code is vulnerable or not. | [
"# frozen_string_literal: true",
"module Sidekiq\n class WebApplication\n extend WebRouter",
" REDIS_KEYS = %w[redis_version uptime_in_days connected_clients used_memory_human used_memory_peak_human]\n CSP_HEADER = [\n \"default-src 'self' https: http:\",\n \"child-src 'self'\",\n \"con... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [9, 5, 81], "buggy_code_start_loc": [5, 4, 71], "filenames": ["Changes.md", "lib/sidekiq/version.rb", "lib/sidekiq/web/application.rb"], "fixing_code_end_loc": [12, 5, 81], "fixing_code_start_loc": [5, 4, 71], "message": "Cross-site Scripting (XSS) - Reflected in GitHub repository sidekiq/sidekiq... | 244 |
Determine whether the {function_name} code is vulnerable or not. | [
"Project: jackson-databind",
"------------------------------------------------------------------------\n=== Releases ===\n------------------------------------------------------------------------",
"2.6.7.2 (not yet released)",
"",
"#1737: Block more JDK types from polymorphic deserialization",
"",
"\n2.... | [
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [8, 69], "buggy_code_start_loc": [7, 69], "filenames": ["release-notes/VERSION", "src/main/java/com/fasterxml/jackson/databind/deser/BeanDeserializerFactory.java"], "fixing_code_end_loc": [12, 76], "fixing_code_start_loc": [8, 70], "message": "FasterXML jackson-databind 2.x before 2.9.7 might all... | 245 |
Determine whether the {function_name} code is vulnerable or not. | [
"Project: jackson-databind",
"------------------------------------------------------------------------\n=== Releases ===\n------------------------------------------------------------------------",
"2.6.7.2 (not yet released)",
"",
"#1737: Block more JDK types from polymorphic deserialization",
"#2097: Blo... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [8, 69], "buggy_code_start_loc": [7, 69], "filenames": ["release-notes/VERSION", "src/main/java/com/fasterxml/jackson/databind/deser/BeanDeserializerFactory.java"], "fixing_code_end_loc": [12, 76], "fixing_code_start_loc": [8, 70], "message": "FasterXML jackson-databind 2.x before 2.9.7 might all... | 245 |
Determine whether the {function_name} code is vulnerable or not. | [
"package com.fasterxml.jackson.databind.deser;",
"import java.lang.reflect.Type;\nimport java.util.*;",
"import com.fasterxml.jackson.annotation.ObjectIdGenerator;\nimport com.fasterxml.jackson.annotation.ObjectIdGenerators;\nimport com.fasterxml.jackson.annotation.ObjectIdResolver;\nimport com.fasterxml.jackso... | [
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [8, 69], "buggy_code_start_loc": [7, 69], "filenames": ["release-notes/VERSION", "src/main/java/com/fasterxml/jackson/databind/deser/BeanDeserializerFactory.java"], "fixing_code_end_loc": [12, 76], "fixing_code_start_loc": [8, 70], "message": "FasterXML jackson-databind 2.x before 2.9.7 might all... | 245 |
Determine whether the {function_name} code is vulnerable or not. | [
"package com.fasterxml.jackson.databind.deser;",
"import java.lang.reflect.Type;\nimport java.util.*;",
"import com.fasterxml.jackson.annotation.ObjectIdGenerator;\nimport com.fasterxml.jackson.annotation.ObjectIdGenerators;\nimport com.fasterxml.jackson.annotation.ObjectIdResolver;\nimport com.fasterxml.jackso... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [8, 69], "buggy_code_start_loc": [7, 69], "filenames": ["release-notes/VERSION", "src/main/java/com/fasterxml/jackson/databind/deser/BeanDeserializerFactory.java"], "fixing_code_end_loc": [12, 76], "fixing_code_start_loc": [8, 70], "message": "FasterXML jackson-databind 2.x before 2.9.7 might all... | 245 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.