prompt stringclasses 1
value | completions listlengths 1 63.8k | labels listlengths 1 63.8k | source stringclasses 1
value | other_info stringlengths 2.06k 101k | index int64 0 6.83k |
|---|---|---|---|---|---|
Determine whether the {function_name} code is vulnerable or not. | [
"<?PHP\r",
"",
" header(\"Content-type: text/xml;charset=utf-8\");\r\n echo \"<?xml version='1.0' encoding='utf-8' ?>\";\r\n $page = $_GET['page'];\r\n $limit = $_GET['rows'];\r\n $sidx = $_GET['sidx'];\r\n if ($sidx == \"invid\")\r\n $sidx = \"correoUSBUsuario\";\r\n\telse if($sidx == ... | [
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 6, 8, 8, 1, 2, 2, 3, 1, 10, 2, 3, 8, 3, 9, 2, 2, 10, 5, 2, 16, 10], "buggy_code_start_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 5, 8, 8, 1, 2, 1, 2, 1, 10, 2, 2, 8, 2, 9, 2, 2, 10, 4, 2, 16, 10], "filenames": ["acciones/IniciarSesion... | 264 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?PHP\r",
" require_once \"../aspectos/Seguridad.php\";\r\n $seguridad = Seguridad::getInstance();\r\n $seguridad->escapeSQL($_GET);\r",
" header(\"Content-type: text/xml;charset=utf-8\");\r\n echo \"<?xml version='1.0' encoding='utf-8' ?>\";\r\n $page = $_GET['page'];\r\n $limit = $_GET['... | [
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 6, 8, 8, 1, 2, 2, 3, 1, 10, 2, 3, 8, 3, 9, 2, 2, 10, 5, 2, 16, 10], "buggy_code_start_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 5, 8, 8, 1, 2, 1, 2, 1, 10, 2, 2, 8, 2, 9, 2, 2, 10, 4, 2, 16, 10], "filenames": ["acciones/IniciarSesion... | 264 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?PHP\r",
"",
" header(\"Content-type: text/xml;charset=utf-8\");\r\n echo \"<?xml version='1.0' encoding='utf-8' ?>\";\r\n\tinclude_once \"../class/class.fachadainterfaz.php\";\r\n\t$fachada = fachadaInterfaz::getInstance();\r\n $result = $fachada->buscarProfes($_GET['nombreProyecto']);\r\n $N = s... | [
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 6, 8, 8, 1, 2, 2, 3, 1, 10, 2, 3, 8, 3, 9, 2, 2, 10, 5, 2, 16, 10], "buggy_code_start_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 5, 8, 8, 1, 2, 1, 2, 1, 10, 2, 2, 8, 2, 9, 2, 2, 10, 4, 2, 16, 10], "filenames": ["acciones/IniciarSesion... | 264 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?PHP\r",
" require_once \"../aspectos/Seguridad.php\";\r\n $seguridad = Seguridad::getInstance();\r\n $seguridad->escapeSQL($_GET);\r",
" header(\"Content-type: text/xml;charset=utf-8\");\r\n echo \"<?xml version='1.0' encoding='utf-8' ?>\";\r\n\tinclude_once \"../class/class.fachadainterfaz.ph... | [
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 6, 8, 8, 1, 2, 2, 3, 1, 10, 2, 3, 8, 3, 9, 2, 2, 10, 5, 2, 16, 10], "buggy_code_start_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 5, 8, 8, 1, 2, 1, 2, 1, 10, 2, 2, 8, 2, 9, 2, 2, 10, 4, 2, 16, 10], "filenames": ["acciones/IniciarSesion... | 264 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?PHP\r",
"",
" header(\"Content-type: text/xml;charset=utf-8\");\r\n echo \"<?xml version='1.0' encoding='utf-8' ?>\";\r\n $page = $_GET['page'];\r\n $limit = $_GET['rows'];\r\n $sidx = $_GET['sidx'];\r\n if ($sidx == \"invid\")\r\n $sidx = \"correoUSB\";\r\n $sord = $_GET['sord'];... | [
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 6, 8, 8, 1, 2, 2, 3, 1, 10, 2, 3, 8, 3, 9, 2, 2, 10, 5, 2, 16, 10], "buggy_code_start_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 5, 8, 8, 1, 2, 1, 2, 1, 10, 2, 2, 8, 2, 9, 2, 2, 10, 4, 2, 16, 10], "filenames": ["acciones/IniciarSesion... | 264 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?PHP\r",
" require_once \"../aspectos/Seguridad.php\";\r\n $seguridad = Seguridad::getInstance();\r\n $seguridad->escapeSQL($_GET);\r",
" header(\"Content-type: text/xml;charset=utf-8\");\r\n echo \"<?xml version='1.0' encoding='utf-8' ?>\";\r\n $page = $_GET['page'];\r\n $limit = $_GET['... | [
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 6, 8, 8, 1, 2, 2, 3, 1, 10, 2, 3, 8, 3, 9, 2, 2, 10, 5, 2, 16, 10], "buggy_code_start_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 5, 8, 8, 1, 2, 1, 2, 1, 10, 2, 2, 8, 2, 9, 2, 2, 10, 4, 2, 16, 10], "filenames": ["acciones/IniciarSesion... | 264 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php \r\n$root = $_SERVER['DOCUMENT_ROOT'].\"/sigeprosi/\";\r\ninclude_once $root.\"class/class.fachadainterfaz.php\";\r\ninclude_once $root.\"class/class.Solicitud.php\";\r",
"\r",
"if (isset($_POST[\"email\"]) && isset($_POST[\"numSol\"])){\r\n\t$solicitud = new solicitud($_POST[\"numSol\"],null,null,null,n... | [
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 6, 8, 8, 1, 2, 2, 3, 1, 10, 2, 3, 8, 3, 9, 2, 2, 10, 5, 2, 16, 10], "buggy_code_start_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 5, 8, 8, 1, 2, 1, 2, 1, 10, 2, 2, 8, 2, 9, 2, 2, 10, 4, 2, 16, 10], "filenames": ["acciones/IniciarSesion... | 264 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php \r\n$root = $_SERVER['DOCUMENT_ROOT'].\"/sigeprosi/\";\r\ninclude_once $root.\"class/class.fachadainterfaz.php\";\r\ninclude_once $root.\"class/class.Solicitud.php\";\r",
"require_once \"../aspectos/Seguridad.php\";\r\n$seguridad = Seguridad::getInstance();\r\n$seguridad->escapeSQL($_POST);\r",
"if (isse... | [
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 6, 8, 8, 1, 2, 2, 3, 1, 10, 2, 3, 8, 3, 9, 2, 2, 10, 5, 2, 16, 10], "buggy_code_start_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 5, 8, 8, 1, 2, 1, 2, 1, 10, 2, 2, 8, 2, 9, 2, 2, 10, 4, 2, 16, 10], "filenames": ["acciones/IniciarSesion... | 264 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php \r\n/*if ($_SERVER['SERVER_ADDR'] == \"127.0.0.1\")\r\n $root = $_SERVER['DOCUMENT_ROOT'].\"/sigeprosi\";\r\n else\r\n $root = \"/home/ps6116-02/public_html/sigeprosi\";\r\n*/\r\n$root = $_SERVER['DOCUMENT_ROOT'].\"/sigeprosi\";\r\ninclude_once $root.\"class/class.f... | [
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 6, 8, 8, 1, 2, 2, 3, 1, 10, 2, 3, 8, 3, 9, 2, 2, 10, 5, 2, 16, 10], "buggy_code_start_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 5, 8, 8, 1, 2, 1, 2, 1, 10, 2, 2, 8, 2, 9, 2, 2, 10, 4, 2, 16, 10], "filenames": ["acciones/IniciarSesion... | 264 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php \r\n/*if ($_SERVER['SERVER_ADDR'] == \"127.0.0.1\")\r\n $root = $_SERVER['DOCUMENT_ROOT'].\"/sigeprosi\";\r\n else\r\n $root = \"/home/ps6116-02/public_html/sigeprosi\";\r\n*/\r\n$root = $_SERVER['DOCUMENT_ROOT'].\"/sigeprosi\";\r\ninclude_once $root.\"class/class.f... | [
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 6, 8, 8, 1, 2, 2, 3, 1, 10, 2, 3, 8, 3, 9, 2, 2, 10, 5, 2, 16, 10], "buggy_code_start_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 5, 8, 8, 1, 2, 1, 2, 1, 10, 2, 2, 8, 2, 9, 2, 2, 10, 4, 2, 16, 10], "filenames": ["acciones/IniciarSesion... | 264 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php \r\n/*if ($_SERVER['SERVER_ADDR'] == \"127.0.0.1\")\r\n $root = $_SERVER['DOCUMENT_ROOT'].\"/sigeprosi\";\r\n else\r\n $root = \"/home/ps6116-02/public_html/sigeprosi\";\r\n*/\r\n$root = $_SERVER['DOCUMENT_ROOT'].\"/sigeprosi\";\r\ninclude_once $root.\"class/class.f... | [
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 6, 8, 8, 1, 2, 2, 3, 1, 10, 2, 3, 8, 3, 9, 2, 2, 10, 5, 2, 16, 10], "buggy_code_start_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 5, 8, 8, 1, 2, 1, 2, 1, 10, 2, 2, 8, 2, 9, 2, 2, 10, 4, 2, 16, 10], "filenames": ["acciones/IniciarSesion... | 264 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php \r\n/*if ($_SERVER['SERVER_ADDR'] == \"127.0.0.1\")\r\n $root = $_SERVER['DOCUMENT_ROOT'].\"/sigeprosi\";\r\n else\r\n $root = \"/home/ps6116-02/public_html/sigeprosi\";\r\n*/\r\n$root = $_SERVER['DOCUMENT_ROOT'].\"/sigeprosi\";\r\ninclude_once $root.\"class/class.f... | [
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 6, 8, 8, 1, 2, 2, 3, 1, 10, 2, 3, 8, 3, 9, 2, 2, 10, 5, 2, 16, 10], "buggy_code_start_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 5, 8, 8, 1, 2, 1, 2, 1, 10, 2, 2, 8, 2, 9, 2, 2, 10, 4, 2, 16, 10], "filenames": ["acciones/IniciarSesion... | 264 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php \r",
"",
"include \"../class/class.fachadainterfaz.php\";\r\n$nro = $_POST[\"nro\"];\r\nif (isset($nro)) {\r\n\t$solicitud = new solicitud($nro,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL);\r\n $solicitud-> autocompletar();\r\n\t\t\t\t $solicitud -> set (\"planteamiento\",$_POST[\"planteamien... | [
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 6, 8, 8, 1, 2, 2, 3, 1, 10, 2, 3, 8, 3, 9, 2, 2, 10, 5, 2, 16, 10], "buggy_code_start_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 5, 8, 8, 1, 2, 1, 2, 1, 10, 2, 2, 8, 2, 9, 2, 2, 10, 4, 2, 16, 10], "filenames": ["acciones/IniciarSesion... | 264 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php \r",
"require_once \"../aspectos/Seguridad.php\";\r\n$seguridad = Seguridad::getInstance();\r\n$seguridad->escapeSQL($_POST);\r",
"include \"../class/class.fachadainterfaz.php\";\r\n$nro = $_POST[\"nro\"];\r\nif (isset($nro)) {\r\n\t$solicitud = new solicitud($nro,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL)... | [
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 6, 8, 8, 1, 2, 2, 3, 1, 10, 2, 3, 8, 3, 9, 2, 2, 10, 5, 2, 16, 10], "buggy_code_start_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 5, 8, 8, 1, 2, 1, 2, 1, 10, 2, 2, 8, 2, 9, 2, 2, 10, 4, 2, 16, 10], "filenames": ["acciones/IniciarSesion... | 264 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php \r\ninclude \"../class/class.fachadainterfaz.php\";\r",
"",
"$email = $_POST[\"email\"];\r\nif (isset($email)) {\r\n\t$user = new Usuario(null,null,$email,null,null, null,null,null);\r\n $user->autocompletar();\r\n\t$user -> set (\"nombre\",$_POST[\"nombre\"]);\r\n $user -> set (\"apellido\",$_POST... | [
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 6, 8, 8, 1, 2, 2, 3, 1, 10, 2, 3, 8, 3, 9, 2, 2, 10, 5, 2, 16, 10], "buggy_code_start_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 5, 8, 8, 1, 2, 1, 2, 1, 10, 2, 2, 8, 2, 9, 2, 2, 10, 4, 2, 16, 10], "filenames": ["acciones/IniciarSesion... | 264 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php \r\ninclude \"../class/class.fachadainterfaz.php\";\r",
"require_once \"../aspectos/Seguridad.php\";\r\n$seguridad = Seguridad::getInstance();\r\n$seguridad->escapeSQL($_POST);\r",
"$email = $_POST[\"email\"];\r\nif (isset($email)) {\r\n\t$user = new Usuario(null,null,$email,null,null, null,null,null);\r... | [
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 6, 8, 8, 1, 2, 2, 3, 1, 10, 2, 3, 8, 3, 9, 2, 2, 10, 5, 2, 16, 10], "buggy_code_start_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 5, 8, 8, 1, 2, 1, 2, 1, 10, 2, 2, 8, 2, 9, 2, 2, 10, 4, 2, 16, 10], "filenames": ["acciones/IniciarSesion... | 264 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php \r",
"include \"../class/class.CasoDeUso.php\";\r",
"",
"$idcu = $_POST[\"idcu\"];\r\n$nombre = $_POST[\"nombre\"];\r\n$descripcion = $_POST[\"descripcion\"];\r\n$completitud = $_POST[\"completitud\"];\r\n$idEquipo = $_POST[\"idequipo\"];\r\n\r\nif (isset($idcu)) {\r\n\t$cu = new casodeuso($nombre,$de... | [
0,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 6, 8, 8, 1, 2, 2, 3, 1, 10, 2, 3, 8, 3, 9, 2, 2, 10, 5, 2, 16, 10], "buggy_code_start_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 5, 8, 8, 1, 2, 1, 2, 1, 10, 2, 2, 8, 2, 9, 2, 2, 10, 4, 2, 16, 10], "filenames": ["acciones/IniciarSesion... | 264 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\r",
"include \"../class/class.CasoDeUso.php\";\r",
"require_once \"../aspectos/Seguridad.php\";\r\n$seguridad = Seguridad::getInstance();\r\n$seguridad->escapeSQL($_POST);\r",
"$idcu = $_POST[\"idcu\"];\r\n$nombre = $_POST[\"nombre\"];\r\n$descripcion = $_POST[\"descripcion\"];\r\n$completitud = $_POST... | [
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 6, 8, 8, 1, 2, 2, 3, 1, 10, 2, 3, 8, 3, 9, 2, 2, 10, 5, 2, 16, 10], "buggy_code_start_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 5, 8, 8, 1, 2, 1, 2, 1, 10, 2, 2, 8, 2, 9, 2, 2, 10, 4, 2, 16, 10], "filenames": ["acciones/IniciarSesion... | 264 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
" include_once \"../class/class.fachadainterfaz.php\";",
"\t$fachada = fachadaInterfaz::getInstance();\n\tif($fachada->editarElemento($_POST[\"catalogo\"],$_POST[\"nombre\"],$_POST[\"catold\"],$_POST[\"nomold\"])==0){\n\t echo '<script>';\n\t echo 'location.href=\"../principal.php?content=gestionar... | [
1,
0,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 6, 8, 8, 1, 2, 2, 3, 1, 10, 2, 3, 8, 3, 9, 2, 2, 10, 5, 2, 16, 10], "buggy_code_start_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 5, 8, 8, 1, 2, 1, 2, 1, 10, 2, 2, 8, 2, 9, 2, 2, 10, 4, 2, 16, 10], "filenames": ["acciones/IniciarSesion... | 264 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
" include_once \"../class/class.fachadainterfaz.php\";\n require_once \"../aspectos/Seguridad.php\";\n $seguridad = Seguridad::getInstance();\n $seguridad->escapeSQL($_POST);",
"\t$fachada = fachadaInterfaz::getInstance();\n\tif($fachada->editarElemento($_POST[\"catalogo\"],$_POST[\"nombre\... | [
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 6, 8, 8, 1, 2, 2, 3, 1, 10, 2, 3, 8, 3, 9, 2, 2, 10, 5, 2, 16, 10], "buggy_code_start_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 5, 8, 8, 1, 2, 1, 2, 1, 10, 2, 2, 8, 2, 9, 2, 2, 10, 4, 2, 16, 10], "filenames": ["acciones/IniciarSesion... | 264 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?PHP",
"",
"if($_POST['oper']=='edit')\n{\n require_once \"../aspectos/Seguridad.php\";\n $seguridad = Seguridad::getInstance();\n $seguridad->escapeSQL($_POST);\n $id = $_POST['id'];\n $nota = $_POST['nota'];\n require_once \"../class/class.Calificacion.php\";\n $calif = new Califi... | [
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 6, 8, 8, 1, 2, 2, 3, 1, 10, 2, 3, 8, 3, 9, 2, 2, 10, 5, 2, 16, 10], "buggy_code_start_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 5, 8, 8, 1, 2, 1, 2, 1, 10, 2, 2, 8, 2, 9, 2, 2, 10, 4, 2, 16, 10], "filenames": ["acciones/IniciarSesion... | 264 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?PHP",
"require_once \"../aspectos/Seguridad.php\";\n$seguridad = Seguridad::getInstance();\n$seguridad->escapeSQL($_POST);",
"if($_POST['oper']=='edit')\n{\n require_once \"../aspectos/Seguridad.php\";\n $seguridad = Seguridad::getInstance();\n $seguridad->escapeSQL($_POST);\n $id = $_POST['i... | [
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 6, 8, 8, 1, 2, 2, 3, 1, 10, 2, 3, 8, 3, 9, 2, 2, 10, 5, 2, 16, 10], "buggy_code_start_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 5, 8, 8, 1, 2, 1, 2, 1, 10, 2, 2, 8, 2, 9, 2, 2, 10, 4, 2, 16, 10], "filenames": ["acciones/IniciarSesion... | 264 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php \r\n\tinclude_once \"../class/class.iteracion.php\";\r\n\tinclude_once \"../class/class.ActividadIteracion.php\";\r\n\tinclude_once \"../class/class.EsRecurso.php\";\r\n\tinclude_once \"../class/class.perteneceIteracion.php\";\r\n\tinclude_once \"../class/class.casoDeUso.php\";\r\n\tinclude_once \"../class/c... | [
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 6, 8, 8, 1, 2, 2, 3, 1, 10, 2, 3, 8, 3, 9, 2, 2, 10, 5, 2, 16, 10], "buggy_code_start_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 5, 8, 8, 1, 2, 1, 2, 1, 10, 2, 2, 8, 2, 9, 2, 2, 10, 4, 2, 16, 10], "filenames": ["acciones/IniciarSesion... | 264 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php \r\n\tinclude_once \"../class/class.iteracion.php\";\r\n\tinclude_once \"../class/class.ActividadIteracion.php\";\r\n\tinclude_once \"../class/class.EsRecurso.php\";\r\n\tinclude_once \"../class/class.perteneceIteracion.php\";\r\n\tinclude_once \"../class/class.casoDeUso.php\";\r\n\tinclude_once \"../class/c... | [
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 6, 8, 8, 1, 2, 2, 3, 1, 10, 2, 3, 8, 3, 9, 2, 2, 10, 5, 2, 16, 10], "buggy_code_start_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 5, 8, 8, 1, 2, 1, 2, 1, 10, 2, 2, 8, 2, 9, 2, 2, 10, 4, 2, 16, 10], "filenames": ["acciones/IniciarSesion... | 264 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php \r\n\tinclude_once \"../class/class.fachadainterfaz.php\";\r",
"",
"\t$fachada = fachadaInterfaz::getInstance();\r\n\t$p=$_POST[\"planificacion_name\"];\r\n\t$n=$_POST[\"numPlanif\"];\r\n\t$pV=$_POST[\"planificacion_name_V\"];\r\n\t$nV=$_POST[\"numPlanif_V\"];\t\r\n\t$etapa = new etapa($n,$p);\r\n\t$etap... | [
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 6, 8, 8, 1, 2, 2, 3, 1, 10, 2, 3, 8, 3, 9, 2, 2, 10, 5, 2, 16, 10], "buggy_code_start_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 5, 8, 8, 1, 2, 1, 2, 1, 10, 2, 2, 8, 2, 9, 2, 2, 10, 4, 2, 16, 10], "filenames": ["acciones/IniciarSesion... | 264 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php \r\n\tinclude_once \"../class/class.fachadainterfaz.php\";\r",
" require_once \"../aspectos/Seguridad.php\";\r\n $seguridad = Seguridad::getInstance();\r\n $seguridad->escapeSQL($_POST);\r",
"\t$fachada = fachadaInterfaz::getInstance();\r\n\t$p=$_POST[\"planificacion_name\"];\r\n\t$n=$_POST[\"nu... | [
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 6, 8, 8, 1, 2, 2, 3, 1, 10, 2, 3, 8, 3, 9, 2, 2, 10, 5, 2, 16, 10], "buggy_code_start_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 5, 8, 8, 1, 2, 1, 2, 1, 10, 2, 2, 8, 2, 9, 2, 2, 10, 4, 2, 16, 10], "filenames": ["acciones/IniciarSesion... | 264 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\r",
" include_once \"../class/class.fachadainterfaz.php\";\r",
"\t$fachada = fachadaInterfaz::getInstance();\r\n\t$telefonos = array();\r\n\t//var_dump($_POST[\"codigo\"]);\r\n\tif(sizeof($_POST[\"nombre\"])!=0 && $_POST[\"tlf\"]!=null){\r\n\t\t$cod=$_POST[\"codigo\"];\r\n\t\t$num=$_POST[\"tlf\"];\r\n\... | [
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 6, 8, 8, 1, 2, 2, 3, 1, 10, 2, 3, 8, 3, 9, 2, 2, 10, 5, 2, 16, 10], "buggy_code_start_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 5, 8, 8, 1, 2, 1, 2, 1, 10, 2, 2, 8, 2, 9, 2, 2, 10, 4, 2, 16, 10], "filenames": ["acciones/IniciarSesion... | 264 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\r",
" require_once \"../aspectos/Seguridad.php\";\r\n $seguridad = Seguridad::getInstance();\r\n $seguridad->escapeSQL($_POST);\r\n include_once \"../class/class.fachadainterfaz.php\";\r",
"\t$fachada = fachadaInterfaz::getInstance();\r\n\t$telefonos = array();\r\n\t//var_dump($_POST[\"codigo... | [
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 6, 8, 8, 1, 2, 2, 3, 1, 10, 2, 3, 8, 3, 9, 2, 2, 10, 5, 2, 16, 10], "buggy_code_start_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 5, 8, 8, 1, 2, 1, 2, 1, 10, 2, 2, 8, 2, 9, 2, 2, 10, 4, 2, 16, 10], "filenames": ["acciones/IniciarSesion... | 264 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php \r\n\t//NO FUNCIONA TODAVIA NO ESTA IMPLEMENTADA\r\n include_once \"../class/class.Solicitud.php\";\r\n include_once \"../class/class.ListaSolicitud.php\";\r\n include_once \"../class/class.TelefonoSolicitud.php\";\r\n include_once \"../class/class.ListaTelefonoSolicitud.php\";\r\n include_onc... | [
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 6, 8, 8, 1, 2, 2, 3, 1, 10, 2, 3, 8, 3, 9, 2, 2, 10, 5, 2, 16, 10], "buggy_code_start_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 5, 8, 8, 1, 2, 1, 2, 1, 10, 2, 2, 8, 2, 9, 2, 2, 10, 4, 2, 16, 10], "filenames": ["acciones/IniciarSesion... | 264 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php \r\n\t//NO FUNCIONA TODAVIA NO ESTA IMPLEMENTADA\r\n include_once \"../class/class.Solicitud.php\";\r\n include_once \"../class/class.ListaSolicitud.php\";\r\n include_once \"../class/class.TelefonoSolicitud.php\";\r\n include_once \"../class/class.ListaTelefonoSolicitud.php\";\r\n include_onc... | [
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 6, 8, 8, 1, 2, 2, 3, 1, 10, 2, 3, 8, 3, 9, 2, 2, 10, 5, 2, 16, 10], "buggy_code_start_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 5, 8, 8, 1, 2, 1, 2, 1, 10, 2, 2, 8, 2, 9, 2, 2, 10, 4, 2, 16, 10], "filenames": ["acciones/IniciarSesion... | 264 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
" include_once \"../class/class.fachadainterfaz.php\";",
"\t$fachada = fachadaInterfaz::getInstance();\n\tif($fachada->eliminarElemento($_GET[\"catalogo\"],$_GET[\"nombre\"])==0){\n\t echo '<script>';\n\t echo 'location.href=\"../principal.php?content=gestionarCatalogo\";';\n\t\techo 'alert(\"El el... | [
1,
0,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 6, 8, 8, 1, 2, 2, 3, 1, 10, 2, 3, 8, 3, 9, 2, 2, 10, 5, 2, 16, 10], "buggy_code_start_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 5, 8, 8, 1, 2, 1, 2, 1, 10, 2, 2, 8, 2, 9, 2, 2, 10, 4, 2, 16, 10], "filenames": ["acciones/IniciarSesion... | 264 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
" require_once \"../aspectos/Seguridad.php\";\n $seguridad = Seguridad::getInstance();\n $seguridad->escapeSQL($_GET);\n include_once \"../class/class.fachadainterfaz.php\";",
"\t$fachada = fachadaInterfaz::getInstance();\n\tif($fachada->eliminarElemento($_GET[\"catalogo\"],$_GET[\"nombre\"... | [
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 6, 8, 8, 1, 2, 2, 3, 1, 10, 2, 3, 8, 3, 9, 2, 2, 10, 5, 2, 16, 10], "buggy_code_start_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 5, 8, 8, 1, 2, 1, 2, 1, 10, 2, 2, 8, 2, 9, 2, 2, 10, 4, 2, 16, 10], "filenames": ["acciones/IniciarSesion... | 264 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php \r\n\t/*\tUNIVERSIDAD SIMON BOLIVAR\r\n\t\tPERIODO:\t\t\tENE-MAR 2012\r\n\t\tMATERIA: \t\t\tSISTEMAS DE INFORMACION II\r\n\t\tNOMBRE DEL ARCHIVO:\tregistrarCasoUso.php\r\n\t*/\r\n //$root = $_SERVER['DOCUMENT_ROOT'].\"/sigeprosi/\";\r\n include_once \"../class/class.CasoDeUso.php\";\r\n //include_on... | [
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 6, 8, 8, 1, 2, 2, 3, 1, 10, 2, 3, 8, 3, 9, 2, 2, 10, 5, 2, 16, 10], "buggy_code_start_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 5, 8, 8, 1, 2, 1, 2, 1, 10, 2, 2, 8, 2, 9, 2, 2, 10, 4, 2, 16, 10], "filenames": ["acciones/IniciarSesion... | 264 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php \r\n\t/*\tUNIVERSIDAD SIMON BOLIVAR\r\n\t\tPERIODO:\t\t\tENE-MAR 2012\r\n\t\tMATERIA: \t\t\tSISTEMAS DE INFORMACION II\r\n\t\tNOMBRE DEL ARCHIVO:\tregistrarCasoUso.php\r\n\t*/\r\n //$root = $_SERVER['DOCUMENT_ROOT'].\"/sigeprosi/\";\r\n include_once \"../class/class.CasoDeUso.php\";\r\n //include_on... | [
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 6, 8, 8, 1, 2, 2, 3, 1, 10, 2, 3, 8, 3, 9, 2, 2, 10, 5, 2, 16, 10], "buggy_code_start_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 5, 8, 8, 1, 2, 1, 2, 1, 10, 2, 2, 8, 2, 9, 2, 2, 10, 4, 2, 16, 10], "filenames": ["acciones/IniciarSesion... | 264 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php \r\n\tinclude_once \"../class/class.fachadainterfaz.php\";\r",
"",
"\t$fachada = fachadaInterfaz::getInstance();\r\n\t$fachada->registrarCoordinador($_POST[\"estudiantes\"]);\r\n\techo '<script>';\r\n\techo 'alert(\"El coordinador fue agregado exitosamente.\");';\r\n\techo 'location.href=\"../principal.p... | [
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 6, 8, 8, 1, 2, 2, 3, 1, 10, 2, 3, 8, 3, 9, 2, 2, 10, 5, 2, 16, 10], "buggy_code_start_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 5, 8, 8, 1, 2, 1, 2, 1, 10, 2, 2, 8, 2, 9, 2, 2, 10, 4, 2, 16, 10], "filenames": ["acciones/IniciarSesion... | 264 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php \r\n\tinclude_once \"../class/class.fachadainterfaz.php\";\r",
" require_once \"../aspectos/Seguridad.php\";\r\n $seguridad = Seguridad::getInstance();\r\n $seguridad->escapeSQL($_POST);\r",
"\t$fachada = fachadaInterfaz::getInstance();\r\n\t$fachada->registrarCoordinador($_POST[\"estudiantes\"]... | [
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 6, 8, 8, 1, 2, 2, 3, 1, 10, 2, 3, 8, 3, 9, 2, 2, 10, 5, 2, 16, 10], "buggy_code_start_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 5, 8, 8, 1, 2, 1, 2, 1, 10, 2, 2, 8, 2, 9, 2, 2, 10, 4, 2, 16, 10], "filenames": ["acciones/IniciarSesion... | 264 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php \r\n\tinclude_once \"../class/class.fachadainterfaz.php\";\r",
"",
"\t$fachada = fachadaInterfaz::getInstance();\r\n\tif(($fachada->registrarEquipo(1,$_POST[\"nombreE\"],$_POST[\"etapa\"],$_POST[\"proyecto\"],$_POST[\"nombre\"],$_POST[\"apellido\"],$_POST[\"email\"],$_POST[\"carne\"],$_POST[\"estudiantes... | [
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 6, 8, 8, 1, 2, 2, 3, 1, 10, 2, 3, 8, 3, 9, 2, 2, 10, 5, 2, 16, 10], "buggy_code_start_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 5, 8, 8, 1, 2, 1, 2, 1, 10, 2, 2, 8, 2, 9, 2, 2, 10, 4, 2, 16, 10], "filenames": ["acciones/IniciarSesion... | 264 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php \r\n\tinclude_once \"../class/class.fachadainterfaz.php\";\r",
" require_once \"../aspectos/Seguridad.php\";\r\n $seguridad = Seguridad::getInstance();\r\n $seguridad->escapeSQL($_POST);\r",
"\t$fachada = fachadaInterfaz::getInstance();\r\n\tif(($fachada->registrarEquipo(1,$_POST[\"nombreE\"],$_... | [
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 6, 8, 8, 1, 2, 2, 3, 1, 10, 2, 3, 8, 3, 9, 2, 2, 10, 5, 2, 16, 10], "buggy_code_start_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 5, 8, 8, 1, 2, 1, 2, 1, 10, 2, 2, 8, 2, 9, 2, 2, 10, 4, 2, 16, 10], "filenames": ["acciones/IniciarSesion... | 264 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php \r\n\tinclude_once \"../class/class.iteracion.php\";\r\n\tinclude_once \"../class/class.ActividadIteracion.php\";\r\n\tinclude_once \"../class/class.EsRecurso.php\";\r\n\tinclude_once \"../class/class.perteneceIteracion.php\";\r\n\tinclude_once \"../class/class.casoDeUso.php\";\r\n\tinclude_once \"../class/c... | [
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 6, 8, 8, 1, 2, 2, 3, 1, 10, 2, 3, 8, 3, 9, 2, 2, 10, 5, 2, 16, 10], "buggy_code_start_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 5, 8, 8, 1, 2, 1, 2, 1, 10, 2, 2, 8, 2, 9, 2, 2, 10, 4, 2, 16, 10], "filenames": ["acciones/IniciarSesion... | 264 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php \r\n\tinclude_once \"../class/class.iteracion.php\";\r\n\tinclude_once \"../class/class.ActividadIteracion.php\";\r\n\tinclude_once \"../class/class.EsRecurso.php\";\r\n\tinclude_once \"../class/class.perteneceIteracion.php\";\r\n\tinclude_once \"../class/class.casoDeUso.php\";\r\n\tinclude_once \"../class/c... | [
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 6, 8, 8, 1, 2, 2, 3, 1, 10, 2, 3, 8, 3, 9, 2, 2, 10, 5, 2, 16, 10], "buggy_code_start_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 5, 8, 8, 1, 2, 1, 2, 1, 10, 2, 2, 8, 2, 9, 2, 2, 10, 4, 2, 16, 10], "filenames": ["acciones/IniciarSesion... | 264 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php \r\n\tinclude_once \"../class/class.fachadainterfaz.php\";\r\n\t$fachada = fachadaInterfaz::getInstance();\r",
"\t\r",
"\tif(($fachada->registrarPlanificacion($_POST[\"planificacion_name\"],$_POST[\"numPlanif\"],$_POST[\"semana\"],$_POST[\"fecha\"],$_POST[\"puntos\"],$_POST[\"descripcion\"],$_POST[\"nomb... | [
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 6, 8, 8, 1, 2, 2, 3, 1, 10, 2, 3, 8, 3, 9, 2, 2, 10, 5, 2, 16, 10], "buggy_code_start_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 5, 8, 8, 1, 2, 1, 2, 1, 10, 2, 2, 8, 2, 9, 2, 2, 10, 4, 2, 16, 10], "filenames": ["acciones/IniciarSesion... | 264 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php \r\n\tinclude_once \"../class/class.fachadainterfaz.php\";\r\n\t$fachada = fachadaInterfaz::getInstance();\r",
"\trequire_once \"../aspectos/Seguridad.php\";\r\n $seguridad = Seguridad::getInstance();\r\n $seguridad->escapeSQL($_POST);\r",
"\tif(($fachada->registrarPlanificacion($_POST[\"planificac... | [
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 6, 8, 8, 1, 2, 2, 3, 1, 10, 2, 3, 8, 3, 9, 2, 2, 10, 5, 2, 16, 10], "buggy_code_start_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 5, 8, 8, 1, 2, 1, 2, 1, 10, 2, 2, 8, 2, 9, 2, 2, 10, 4, 2, 16, 10], "filenames": ["acciones/IniciarSesion... | 264 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php \r\n\tinclude_once \"../class/class.fachadainterfaz.php\";\r",
"",
"\t$fachada = fachadaInterfaz::getInstance();\r\n\t$cod=$_POST[\"codigo\"];\r\n\t$num=$_POST[\"tlf\"];\r\n\t$telefonos=array();\r\n\t$i=0;\r\n\tforeach ($cod as $codigo){\r\n\t\t$telefonos[$i]=$cod[$i].\"\".$num[$i];\r\n\t\t$i++;\r\n\t}\r... | [
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 6, 8, 8, 1, 2, 2, 3, 1, 10, 2, 3, 8, 3, 9, 2, 2, 10, 5, 2, 16, 10], "buggy_code_start_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 5, 8, 8, 1, 2, 1, 2, 1, 10, 2, 2, 8, 2, 9, 2, 2, 10, 4, 2, 16, 10], "filenames": ["acciones/IniciarSesion... | 264 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php \r\n\tinclude_once \"../class/class.fachadainterfaz.php\";\r",
" require_once \"../aspectos/Seguridad.php\";\r\n $seguridad = Seguridad::getInstance();\r\n $seguridad->escapeSQL($_POST);\r",
"\t$fachada = fachadaInterfaz::getInstance();\r\n\t$cod=$_POST[\"codigo\"];\r\n\t$num=$_POST[\"tlf\"];\r\... | [
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 6, 8, 8, 1, 2, 2, 3, 1, 10, 2, 3, 8, 3, 9, 2, 2, 10, 5, 2, 16, 10], "buggy_code_start_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 5, 8, 8, 1, 2, 1, 2, 1, 10, 2, 2, 8, 2, 9, 2, 2, 10, 4, 2, 16, 10], "filenames": ["acciones/IniciarSesion... | 264 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php \n\t/*\tUNIVERSIDAD SIMON BOLIVAR\n\t\tPERIODO:\t\t\tENE-MAR 2012\n\t\tMATERIA: \t\t\tSISTEMAS DE INFORMACION II\n\t\tNOMBRE DEL ARCHIVO:\tregistrarSolicitud.php\n\t*/\n /*if ($_SERVER['SERVER_ADDR'] == \"127.0.0.1\")\n $root = $_SERVER['DOCUMENT_ROOT'].\"/sigeprosi\";\n else\n ... | [
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 6, 8, 8, 1, 2, 2, 3, 1, 10, 2, 3, 8, 3, 9, 2, 2, 10, 5, 2, 16, 10], "buggy_code_start_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 5, 8, 8, 1, 2, 1, 2, 1, 10, 2, 2, 8, 2, 9, 2, 2, 10, 4, 2, 16, 10], "filenames": ["acciones/IniciarSesion... | 264 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php \n\t/*\tUNIVERSIDAD SIMON BOLIVAR\n\t\tPERIODO:\t\t\tENE-MAR 2012\n\t\tMATERIA: \t\t\tSISTEMAS DE INFORMACION II\n\t\tNOMBRE DEL ARCHIVO:\tregistrarSolicitud.php\n\t*/\n /*if ($_SERVER['SERVER_ADDR'] == \"127.0.0.1\")\n $root = $_SERVER['DOCUMENT_ROOT'].\"/sigeprosi\";\n else\n ... | [
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 6, 8, 8, 1, 2, 2, 3, 1, 10, 2, 3, 8, 3, 9, 2, 2, 10, 5, 2, 16, 10], "buggy_code_start_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 5, 8, 8, 1, 2, 1, 2, 1, 10, 2, 2, 8, 2, 9, 2, 2, 10, 4, 2, 16, 10], "filenames": ["acciones/IniciarSesion... | 264 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/*if ($_SERVER['SERVER_ADDR'] == \"127.0.0.1\")\n $root = $_SERVER['DOCUMENT_ROOT'].\"/sigeprosi\";\n else\n $root = \"/home/ps6116-02/public_html/sigeprosi\";\n*/\n$root = $_SERVER['DOCUMENT_ROOT'].\"/sigeprosi\";\ninclude_once $root.\"/class/class.Usuario.php\";\... | [
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 6, 8, 8, 1, 2, 2, 3, 1, 10, 2, 3, 8, 3, 9, 2, 2, 10, 5, 2, 16, 10], "buggy_code_start_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 5, 8, 8, 1, 2, 1, 2, 1, 10, 2, 2, 8, 2, 9, 2, 2, 10, 4, 2, 16, 10], "filenames": ["acciones/IniciarSesion... | 264 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/*if ($_SERVER['SERVER_ADDR'] == \"127.0.0.1\")\n $root = $_SERVER['DOCUMENT_ROOT'].\"/sigeprosi\";\n else\n $root = \"/home/ps6116-02/public_html/sigeprosi\";\n*/\n$root = $_SERVER['DOCUMENT_ROOT'].\"/sigeprosi\";\ninclude_once $root.\"/class/class.Usuario.php\";\... | [
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 6, 8, 8, 1, 2, 2, 3, 1, 10, 2, 3, 8, 3, 9, 2, 2, 10, 5, 2, 16, 10], "buggy_code_start_loc": [11, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 5, 8, 8, 1, 2, 1, 2, 1, 10, 2, 2, 8, 2, 9, 2, 2, 10, 4, 2, 16, 10], "filenames": ["acciones/IniciarSesion... | 264 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * COPYRIGHT (c) International Business Machines Corp. 2001-2017\n *\n * This program is provided under the terms of the Common Public License,\n * version 1.0 (CPL-1.0). Any use, reproduction or distribution for this\n * software constitutes recipient's acceptance of CPL-1.0 terms which can be\n * found in th... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [4402], "buggy_code_start_loc": [4367], "filenames": ["usr/lib/soft_stdll/soft_specific.c"], "fixing_code_end_loc": [4415], "fixing_code_start_loc": [4368], "message": "A flaw was found in openCryptoki. The openCryptoki Soft token does not check if an EC key is valid when an EC key is created via... | 265 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * COPYRIGHT (c) International Business Machines Corp. 2001-2017\n *\n * This program is provided under the terms of the Common Public License,\n * version 1.0 (CPL-1.0). Any use, reproduction or distribution for this\n * software constitutes recipient's acceptance of CPL-1.0 terms which can be\n * found in th... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [4402], "buggy_code_start_loc": [4367], "filenames": ["usr/lib/soft_stdll/soft_specific.c"], "fixing_code_end_loc": [4415], "fixing_code_start_loc": [4368], "message": "A flaw was found in openCryptoki. The openCryptoki Soft token does not check if an EC key is valid when an EC key is created via... | 265 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * JPEG 2000 image decoder\n * Copyright (c) 2007 Kamil Nowosad\n * Copyright (c) 2013 Nicolas Bertrand <nicoinattendu@gmail.com>\n *\n * This file is part of FFmpeg.\n *\n * FFmpeg is free software; you can redistribute it and/or\n * modify it under the terms of the GNU Lesser General Public\n * License as pu... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [378], "buggy_code_start_loc": [372], "filenames": ["libavcodec/jpeg2000dec.c"], "fixing_code_end_loc": [385], "fixing_code_start_loc": [373], "message": "The get_cox function in libavcodec/jpeg2000dec.c in FFmpeg before 2.1 does not properly validate the reduction factor, which allows remote att... | 266 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * JPEG 2000 image decoder\n * Copyright (c) 2007 Kamil Nowosad\n * Copyright (c) 2013 Nicolas Bertrand <nicoinattendu@gmail.com>\n *\n * This file is part of FFmpeg.\n *\n * FFmpeg is free software; you can redistribute it and/or\n * modify it under the terms of the GNU Lesser General Public\n * License as pu... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [378], "buggy_code_start_loc": [372], "filenames": ["libavcodec/jpeg2000dec.c"], "fixing_code_end_loc": [385], "fixing_code_start_loc": [373], "message": "The get_cox function in libavcodec/jpeg2000dec.c in FFmpeg before 2.1 does not properly validate the reduction factor, which allows remote att... | 266 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* global Symbol */\n// Defining this global in .eslintrc.json would create a danger of using the global\n// unguarded in another place, it seems safer to define global only for this module",
"define( [\n\t\"./var/arr\",\n\t\"./var/document\",\n\t\"./var/getProto\",\n\t\"./var/slice\",\n\t\"./var/concat\",\n\t\"... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [163, 1064], "buggy_code_start_loc": [160, 1064], "filenames": ["src/core.js", "test/unit/core.js"], "fixing_code_end_loc": [164, 1072], "fixing_code_start_loc": [161, 1065], "message": "jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, .... | 267 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* global Symbol */\n// Defining this global in .eslintrc.json would create a danger of using the global\n// unguarded in another place, it seems safer to define global only for this module",
"define( [\n\t\"./var/arr\",\n\t\"./var/document\",\n\t\"./var/getProto\",\n\t\"./var/slice\",\n\t\"./var/concat\",\n\t\"... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [163, 1064], "buggy_code_start_loc": [160, 1064], "filenames": ["src/core.js", "test/unit/core.js"], "fixing_code_end_loc": [164, 1072], "fixing_code_start_loc": [161, 1065], "message": "jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, .... | 267 |
Determine whether the {function_name} code is vulnerable or not. | [
"QUnit.module( \"core\", {\n\tbeforeEach: function() {\n\t\tthis.sandbox = sinon.sandbox.create();\n\t},\n\tafterEach: function() {\n\t\tthis.sandbox.restore();\n\t\treturn moduleTeardown.apply( this, arguments );\n\t}\n} );",
"QUnit.test( \"Basic requirements\", function( assert ) {\n\tassert.expect( 7 );\n\tass... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [163, 1064], "buggy_code_start_loc": [160, 1064], "filenames": ["src/core.js", "test/unit/core.js"], "fixing_code_end_loc": [164, 1072], "fixing_code_start_loc": [161, 1065], "message": "jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, .... | 267 |
Determine whether the {function_name} code is vulnerable or not. | [
"QUnit.module( \"core\", {\n\tbeforeEach: function() {\n\t\tthis.sandbox = sinon.sandbox.create();\n\t},\n\tafterEach: function() {\n\t\tthis.sandbox.restore();\n\t\treturn moduleTeardown.apply( this, arguments );\n\t}\n} );",
"QUnit.test( \"Basic requirements\", function( assert ) {\n\tassert.expect( 7 );\n\tass... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [163, 1064], "buggy_code_start_loc": [160, 1064], "filenames": ["src/core.js", "test/unit/core.js"], "fixing_code_end_loc": [164, 1072], "fixing_code_start_loc": [161, 1065], "message": "jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, .... | 267 |
Determine whether the {function_name} code is vulnerable or not. | [
"// SPDX-License-Identifier: GPL-2.0\n/* Parts of this driver are based on the following:\n * - Kvaser linux leaf driver (version 4.78)\n * - CAN driver for esd CAN-USB/2\n * - Kvaser linux usbcanII driver (version 5.3)\n *\n * Copyright (C) 2002-2018 KVASER AB, Sweden. All rights reserved.\n * Copyright (C) 201... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1210], "buggy_code_start_loc": [611], "filenames": ["drivers/net/can/usb/kvaser_usb/kvaser_usb_leaf.c"], "fixing_code_end_loc": [1210], "fixing_code_start_loc": [611], "message": "In the Linux kernel through 5.4.6, there are information leaks of uninitialized memory to a USB device in the driver... | 268 |
Determine whether the {function_name} code is vulnerable or not. | [
"// SPDX-License-Identifier: GPL-2.0\n/* Parts of this driver are based on the following:\n * - Kvaser linux leaf driver (version 4.78)\n * - CAN driver for esd CAN-USB/2\n * - Kvaser linux usbcanII driver (version 5.3)\n *\n * Copyright (C) 2002-2018 KVASER AB, Sweden. All rights reserved.\n * Copyright (C) 201... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1210], "buggy_code_start_loc": [611], "filenames": ["drivers/net/can/usb/kvaser_usb/kvaser_usb_leaf.c"], "fixing_code_end_loc": [1210], "fixing_code_start_loc": [611], "message": "In the Linux kernel through 5.4.6, there are information leaks of uninitialized memory to a USB device in the driver... | 268 |
Determine whether the {function_name} code is vulnerable or not. | [
"import unittest",
"from vncap.vnc.protocol import VNCServerAuthenticator",
"class DummyTransport(object):",
" buf = \"\"\n lost = False",
" def write(self, data):\n self.buf += data",
" def loseConnection(self):\n self.lost = True",
"",
"\nclass TestVNCServerAuthenticator(un... | [
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
0,
1,
0
] | PreciseBugs | {"buggy_code_end_loc": [37, 99], "buggy_code_start_loc": [14, 76], "filenames": ["vncap/tests/test_protocol.py", "vncap/vnc/protocol.py"], "fixing_code_end_loc": [52, 95], "fixing_code_start_loc": [15, 76], "message": "OSU Open Source Lab VNCAuthProxy through 1.1.1 is affected by an vncap/vnc/protocol.py VNCServerAuthe... | 269 |
Determine whether the {function_name} code is vulnerable or not. | [
"import unittest",
"from vncap.vnc.protocol import VNCServerAuthenticator",
"class DummyTransport(object):",
" buf = \"\"\n lost = False",
" def write(self, data):\n self.buf += data",
" def loseConnection(self):\n self.lost = True",
"\n def pauseProducing(self):\n pa... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [37, 99], "buggy_code_start_loc": [14, 76], "filenames": ["vncap/tests/test_protocol.py", "vncap/vnc/protocol.py"], "fixing_code_end_loc": [52, 95], "fixing_code_start_loc": [15, 76], "message": "OSU Open Source Lab VNCAuthProxy through 1.1.1 is affected by an vncap/vnc/protocol.py VNCServerAuthe... | 269 |
Determine whether the {function_name} code is vulnerable or not. | [
"from os import urandom",
"from twisted.internet import reactor\nfrom twisted.internet.defer import Deferred\nfrom twisted.protocols.stateful import StatefulProtocol\nfrom twisted.python import log",
"from vncap.vnc.d3des import generate_response",
"def check_password(challenge, response, password):\n pass... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [37, 99], "buggy_code_start_loc": [14, 76], "filenames": ["vncap/tests/test_protocol.py", "vncap/vnc/protocol.py"], "fixing_code_end_loc": [52, 95], "fixing_code_start_loc": [15, 76], "message": "OSU Open Source Lab VNCAuthProxy through 1.1.1 is affected by an vncap/vnc/protocol.py VNCServerAuthe... | 269 |
Determine whether the {function_name} code is vulnerable or not. | [
"from os import urandom",
"from twisted.internet import reactor\nfrom twisted.internet.defer import Deferred\nfrom twisted.protocols.stateful import StatefulProtocol\nfrom twisted.python import log",
"from vncap.vnc.d3des import generate_response",
"def check_password(challenge, response, password):\n pass... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [37, 99], "buggy_code_start_loc": [14, 76], "filenames": ["vncap/tests/test_protocol.py", "vncap/vnc/protocol.py"], "fixing_code_end_loc": [52, 95], "fixing_code_start_loc": [15, 76], "message": "OSU Open Source Lab VNCAuthProxy through 1.1.1 is affected by an vncap/vnc/protocol.py VNCServerAuthe... | 269 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php namespace Cms\\Classes;",
"use File;\nuse Lang;\nuse Config;\nuse Request;\nuse Cms\\Helpers\\File as FileHelper;\nuse October\\Rain\\Extension\\Extendable;\nuse ApplicationException;\nuse ValidationException;",
"/**\n * The CMS theme asset file class.\n *\n * @package october\\cms\n * @author Alexey Bob... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [289], "buggy_code_start_loc": [288], "filenames": ["modules/cms/classes/Asset.php"], "fixing_code_end_loc": [296], "fixing_code_start_loc": [288], "message": "In OctoberCMS (october/october composer package) versions from 1.0.319 and before 1.0.466, an attacker can exploit this vulnerability to ... | 270 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php namespace Cms\\Classes;",
"use File;\nuse Lang;\nuse Config;\nuse Request;\nuse Cms\\Helpers\\File as FileHelper;\nuse October\\Rain\\Extension\\Extendable;\nuse ApplicationException;\nuse ValidationException;",
"/**\n * The CMS theme asset file class.\n *\n * @package october\\cms\n * @author Alexey Bob... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [289], "buggy_code_start_loc": [288], "filenames": ["modules/cms/classes/Asset.php"], "fixing_code_end_loc": [296], "fixing_code_start_loc": [288], "message": "In OctoberCMS (october/october composer package) versions from 1.0.319 and before 1.0.466, an attacker can exploit this vulnerability to ... | 270 |
Determine whether the {function_name} code is vulnerable or not. | [
"# frozen_string_literal: true",
"require_dependency \"mobile_detection\"\nrequire_dependency \"crawler_detection\"\nrequire_dependency \"guardian\"\nrequire_dependency \"http_language_parser\"",
"module Middleware\n class AnonymousCache",
" def self.cache_key_segments\n @@cache_key_segments ||= {\n ... | [
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [115, 80], "buggy_code_start_loc": [14, 80], "filenames": ["lib/middleware/anonymous_cache.rb", "spec/components/middleware/anonymous_cache_spec.rb"], "fixing_code_end_loc": [121, 89], "fixing_code_start_loc": [15, 81], "message": "Discourse is an open source platform for community discussion. In... | 271 |
Determine whether the {function_name} code is vulnerable or not. | [
"# frozen_string_literal: true",
"require_dependency \"mobile_detection\"\nrequire_dependency \"crawler_detection\"\nrequire_dependency \"guardian\"\nrequire_dependency \"http_language_parser\"",
"module Middleware\n class AnonymousCache",
" def self.cache_key_segments\n @@cache_key_segments ||= {\n ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [115, 80], "buggy_code_start_loc": [14, 80], "filenames": ["lib/middleware/anonymous_cache.rb", "spec/components/middleware/anonymous_cache_spec.rb"], "fixing_code_end_loc": [121, 89], "fixing_code_start_loc": [15, 81], "message": "Discourse is an open source platform for community discussion. In... | 271 |
Determine whether the {function_name} code is vulnerable or not. | [
"# frozen_string_literal: true",
"require \"rails_helper\"",
"describe Middleware::AnonymousCache do\n let(:middleware) { Middleware::AnonymousCache.new(lambda { |_| [200, {}, []] }) }",
" def env(opts = {})\n create_request_env(path: \"http://test.com/path?bla=1\").merge(opts)\n end",
" describe Mid... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [115, 80], "buggy_code_start_loc": [14, 80], "filenames": ["lib/middleware/anonymous_cache.rb", "spec/components/middleware/anonymous_cache_spec.rb"], "fixing_code_end_loc": [121, 89], "fixing_code_start_loc": [15, 81], "message": "Discourse is an open source platform for community discussion. In... | 271 |
Determine whether the {function_name} code is vulnerable or not. | [
"# frozen_string_literal: true",
"require \"rails_helper\"",
"describe Middleware::AnonymousCache do\n let(:middleware) { Middleware::AnonymousCache.new(lambda { |_| [200, {}, []] }) }",
" def env(opts = {})\n create_request_env(path: \"http://test.com/path?bla=1\").merge(opts)\n end",
" describe Mid... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [115, 80], "buggy_code_start_loc": [14, 80], "filenames": ["lib/middleware/anonymous_cache.rb", "spec/components/middleware/anonymous_cache_spec.rb"], "fixing_code_end_loc": [121, 89], "fixing_code_start_loc": [15, 81], "message": "Discourse is an open source platform for community discussion. In... | 271 |
Determine whether the {function_name} code is vulnerable or not. | [
"#!/usr/bin/env python3\n# -*- coding: utf-8 -*-\n#\n# Database layer translates database calls to functions\n#\n# Software is free software released under the \"GNU Affero General Public License v3.0\"\n#\n# Copyright (c) 2015-2018 Pieter-Jan Moreels - pieterjan.moreels@gmail.com",
"# imports\nimport ast\nimpor... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [242], "buggy_code_start_loc": [241], "filenames": ["lib/DatabaseLayer.py"], "fixing_code_end_loc": [242], "fixing_code_start_loc": [241], "message": "lib/DatabaseLayer.py in cve-search before 4.1.0 allows regular expression injection, which can lead to ReDoS (regular expression denial of service... | 272 |
Determine whether the {function_name} code is vulnerable or not. | [
"#!/usr/bin/env python3\n# -*- coding: utf-8 -*-\n#\n# Database layer translates database calls to functions\n#\n# Software is free software released under the \"GNU Affero General Public License v3.0\"\n#\n# Copyright (c) 2015-2018 Pieter-Jan Moreels - pieterjan.moreels@gmail.com",
"# imports\nimport ast\nimpor... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [242], "buggy_code_start_loc": [241], "filenames": ["lib/DatabaseLayer.py"], "fixing_code_end_loc": [242], "fixing_code_start_loc": [241], "message": "lib/DatabaseLayer.py in cve-search before 4.1.0 allows regular expression injection, which can lead to ReDoS (regular expression denial of service... | 272 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php namespace BookStack\\Http\\Controllers;",
"use BookStack\\Entities\\Repos\\PageRepo;\nuse BookStack\\Exceptions\\FileUploadException;\nuse BookStack\\Exceptions\\NotFoundException;\nuse BookStack\\Uploads\\Attachment;\nuse BookStack\\Uploads\\AttachmentService;\nuse Exception;\nuse Illuminate\\Contracts\\F... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [165, 45, 139, 92, 244], "buggy_code_start_loc": [113, 45, 91, 92, 5], "filenames": ["app/Http/Controllers/AttachmentController.php", "app/Providers/AppServiceProvider.php", "app/Uploads/AttachmentService.php", "resources/lang/en/validation.php", "tests/Uploads/AttachmentTest.php"], "fixing_code_... | 273 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php namespace BookStack\\Http\\Controllers;",
"use BookStack\\Entities\\Repos\\PageRepo;\nuse BookStack\\Exceptions\\FileUploadException;\nuse BookStack\\Exceptions\\NotFoundException;\nuse BookStack\\Uploads\\Attachment;\nuse BookStack\\Uploads\\AttachmentService;\nuse Exception;\nuse Illuminate\\Contracts\\F... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [165, 45, 139, 92, 244], "buggy_code_start_loc": [113, 45, 91, 92, 5], "filenames": ["app/Http/Controllers/AttachmentController.php", "app/Providers/AppServiceProvider.php", "app/Uploads/AttachmentService.php", "resources/lang/en/validation.php", "tests/Uploads/AttachmentTest.php"], "fixing_code_... | 273 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php namespace BookStack\\Providers;",
"use Blade;\nuse BookStack\\Entities\\Book;\nuse BookStack\\Entities\\Bookshelf;\nuse BookStack\\Entities\\BreadcrumbsViewComposer;\nuse BookStack\\Entities\\Chapter;\nuse BookStack\\Entities\\Page;\nuse BookStack\\Settings\\Setting;\nuse BookStack\\Settings\\SettingServic... | [
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [165, 45, 139, 92, 244], "buggy_code_start_loc": [113, 45, 91, 92, 5], "filenames": ["app/Http/Controllers/AttachmentController.php", "app/Providers/AppServiceProvider.php", "app/Uploads/AttachmentService.php", "resources/lang/en/validation.php", "tests/Uploads/AttachmentTest.php"], "fixing_code_... | 273 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php namespace BookStack\\Providers;",
"use Blade;\nuse BookStack\\Entities\\Book;\nuse BookStack\\Entities\\Bookshelf;\nuse BookStack\\Entities\\BreadcrumbsViewComposer;\nuse BookStack\\Entities\\Chapter;\nuse BookStack\\Entities\\Page;\nuse BookStack\\Settings\\Setting;\nuse BookStack\\Settings\\SettingServic... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [165, 45, 139, 92, 244], "buggy_code_start_loc": [113, 45, 91, 92, 5], "filenames": ["app/Http/Controllers/AttachmentController.php", "app/Providers/AppServiceProvider.php", "app/Uploads/AttachmentService.php", "resources/lang/en/validation.php", "tests/Uploads/AttachmentTest.php"], "fixing_code_... | 273 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php namespace BookStack\\Uploads;",
"use BookStack\\Exceptions\\FileUploadException;\nuse Exception;\nuse Illuminate\\Support\\Str;\nuse Symfony\\Component\\HttpFoundation\\File\\UploadedFile;",
"class AttachmentService extends UploadService\n{",
" /**\n * Get the storage that will be used for stori... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1,
0,
1,
0,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [165, 45, 139, 92, 244], "buggy_code_start_loc": [113, 45, 91, 92, 5], "filenames": ["app/Http/Controllers/AttachmentController.php", "app/Providers/AppServiceProvider.php", "app/Uploads/AttachmentService.php", "resources/lang/en/validation.php", "tests/Uploads/AttachmentTest.php"], "fixing_code_... | 273 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php namespace BookStack\\Uploads;",
"use BookStack\\Exceptions\\FileUploadException;\nuse Exception;\nuse Illuminate\\Support\\Str;\nuse Symfony\\Component\\HttpFoundation\\File\\UploadedFile;",
"class AttachmentService extends UploadService\n{",
" /**\n * Get the storage that will be used for stori... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [165, 45, 139, 92, 244], "buggy_code_start_loc": [113, 45, 91, 92, 5], "filenames": ["app/Http/Controllers/AttachmentController.php", "app/Providers/AppServiceProvider.php", "app/Uploads/AttachmentService.php", "resources/lang/en/validation.php", "tests/Uploads/AttachmentTest.php"], "fixing_code_... | 273 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/**\n * Validation Lines\n * The following language lines contain the default error messages used by\n * the validator class. Some of these rules have multiple versions such\n * as the size rules. Feel free to tweak each of these messages here.\n */\nreturn [",
" // Standard laravel validation lines\n ... | [
1,
1,
0,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [165, 45, 139, 92, 244], "buggy_code_start_loc": [113, 45, 91, 92, 5], "filenames": ["app/Http/Controllers/AttachmentController.php", "app/Providers/AppServiceProvider.php", "app/Uploads/AttachmentService.php", "resources/lang/en/validation.php", "tests/Uploads/AttachmentTest.php"], "fixing_code_... | 273 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/**\n * Validation Lines\n * The following language lines contain the default error messages used by\n * the validator class. Some of these rules have multiple versions such\n * as the size rules. Feel free to tweak each of these messages here.\n */\nreturn [",
" // Standard laravel validation lines\n ... | [
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [165, 45, 139, 92, 244], "buggy_code_start_loc": [113, 45, 91, 92, 5], "filenames": ["app/Http/Controllers/AttachmentController.php", "app/Providers/AppServiceProvider.php", "app/Uploads/AttachmentService.php", "resources/lang/en/validation.php", "tests/Uploads/AttachmentTest.php"], "fixing_code_... | 273 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php namespace Tests\\Uploads;",
"use BookStack\\Uploads\\Attachment;\nuse BookStack\\Entities\\Page;\nuse BookStack\\Auth\\Permissions\\PermissionService;",
"",
"use Tests\\TestCase;",
"",
"\nclass AttachmentTest extends TestCase\n{\n /**\n * Get a test file that can be uploaded",
" * @par... | [
1,
1,
0,
1,
0,
1,
0,
1,
1,
0,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
0,
0,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0... | PreciseBugs | {"buggy_code_end_loc": [165, 45, 139, 92, 244], "buggy_code_start_loc": [113, 45, 91, 92, 5], "filenames": ["app/Http/Controllers/AttachmentController.php", "app/Providers/AppServiceProvider.php", "app/Uploads/AttachmentService.php", "resources/lang/en/validation.php", "tests/Uploads/AttachmentTest.php"], "fixing_code_... | 273 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php namespace Tests\\Uploads;",
"use BookStack\\Uploads\\Attachment;\nuse BookStack\\Entities\\Page;\nuse BookStack\\Auth\\Permissions\\PermissionService;",
"use BookStack\\Uploads\\AttachmentService;\nuse Illuminate\\Http\\UploadedFile;",
"use Tests\\TestCase;",
"use Tests\\TestResponse;",
"\nclass At... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [165, 45, 139, 92, 244], "buggy_code_start_loc": [113, 45, 91, 92, 5], "filenames": ["app/Http/Controllers/AttachmentController.php", "app/Providers/AppServiceProvider.php", "app/Uploads/AttachmentService.php", "resources/lang/en/validation.php", "tests/Uploads/AttachmentTest.php"], "fixing_code_... | 273 |
Determine whether the {function_name} code is vulnerable or not. | [
"import { configFromStringAndFormat } from './from-string-and-format';\nimport { createUTCDate } from './date-from-array';\nimport { hooks } from '../utils/hooks';\nimport { deprecate } from '../utils/deprecate';\nimport getParsingFlags from './parsing-flags';\nimport { defaultLocaleMonthsShort } from '../units/mon... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [155], "buggy_code_start_loc": [154], "filenames": ["src/lib/create/from-string.js"], "fixing_code_end_loc": [155], "fixing_code_start_loc": [154], "message": "moment is a JavaScript date library for parsing, validating, manipulating, and formatting dates. Affected versions of moment were found t... | 274 |
Determine whether the {function_name} code is vulnerable or not. | [
"import { configFromStringAndFormat } from './from-string-and-format';\nimport { createUTCDate } from './date-from-array';\nimport { hooks } from '../utils/hooks';\nimport { deprecate } from '../utils/deprecate';\nimport getParsingFlags from './parsing-flags';\nimport { defaultLocaleMonthsShort } from '../units/mon... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [155], "buggy_code_start_loc": [154], "filenames": ["src/lib/create/from-string.js"], "fixing_code_end_loc": [155], "fixing_code_start_loc": [154], "message": "moment is a JavaScript date library for parsing, validating, manipulating, and formatting dates. Affected versions of moment were found t... | 274 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * libp11 PAM Login Module\n * Copyright (C) 2003 Mario Strasser <mast@gmx.net>,\n *\n * This library is free software; you can redistribute it and/or\n * modify it under the terms of the GNU Lesser General Public\n * License as published by the Free Software Foundation; either\n * version 2.1 of the License, ... | [
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [669], "buggy_code_start_loc": [33], "filenames": ["src/pam_p11.c"], "fixing_code_end_loc": [681], "fixing_code_start_loc": [34], "message": "An issue was discovered in the pam_p11 component 0.2.0 and 0.3.0 for OpenSC. If a smart card creates a signature with a length longer than 256 bytes, this ... | 275 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * libp11 PAM Login Module\n * Copyright (C) 2003 Mario Strasser <mast@gmx.net>,\n *\n * This library is free software; you can redistribute it and/or\n * modify it under the terms of the GNU Lesser General Public\n * License as published by the Free Software Foundation; either\n * version 2.1 of the License, ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [669], "buggy_code_start_loc": [33], "filenames": ["src/pam_p11.c"], "fixing_code_end_loc": [681], "fixing_code_start_loc": [34], "message": "An issue was discovered in the pam_p11 component 0.2.0 and 0.3.0 for OpenSC. If a smart card creates a signature with a length longer than 256 bytes, this ... | 275 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\nnamespace FreePBX\\modules;",
"class Manager implements \\BMO {\n\tpublic function __construct($freepbx = null) {\n\t\tif ($freepbx == null) {\n\t\t\tthrow new Exception(\"Not given a FreePBX Object\");\n\t\t}\n\t\t$this->FreePBX = $freepbx;\n\t\t$this->db = $freepbx->Database;\n\t}\n\tpublic function ins... | [
1,
1,
1,
0,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [71, 5], "buggy_code_start_loc": [70, 4], "filenames": ["Manager.class.php", "views/form.php"], "fixing_code_end_loc": [71, 5], "fixing_code_start_loc": [70, 4], "message": "An issue was discovered in Manager 13.x before 13.0.2.6 and 15.x before 15.0.6 before FreePBX 14.0.10.3. In the Manager mod... | 276 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\nnamespace FreePBX\\modules;",
"class Manager implements \\BMO {\n\tpublic function __construct($freepbx = null) {\n\t\tif ($freepbx == null) {\n\t\t\tthrow new Exception(\"Not given a FreePBX Object\");\n\t\t}\n\t\t$this->FreePBX = $freepbx;\n\t\t$this->db = $freepbx->Database;\n\t}\n\tpublic function ins... | [
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [71, 5], "buggy_code_start_loc": [70, 4], "filenames": ["Manager.class.php", "views/form.php"], "fixing_code_end_loc": [71, 5], "fixing_code_start_loc": [70, 4], "message": "An issue was discovered in Manager 13.x before 13.0.2.6 and 15.x before 15.0.6 before FreePBX 14.0.10.3. In the Manager mod... | 276 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"if (isset($_REQUEST['managerdisplay'])){",
" $managerdisplay = $_REQUEST['managerdisplay'];",
" $subhead = '<h2>'._(\"Manager\").' '.$managerdisplay.'</h2>';\n $delURL = '?display=manager&managerdisplay='.$managerdisplay.'&action=delete';\n //get details for this manager\n $thisManager ... | [
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [71, 5], "buggy_code_start_loc": [70, 4], "filenames": ["Manager.class.php", "views/form.php"], "fixing_code_end_loc": [71, 5], "fixing_code_start_loc": [70, 4], "message": "An issue was discovered in Manager 13.x before 13.0.2.6 and 15.x before 15.0.6 before FreePBX 14.0.10.3. In the Manager mod... | 276 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"if (isset($_REQUEST['managerdisplay'])){",
" $managerdisplay = htmlentities($_REQUEST['managerdisplay'], ENT_QUOTES);",
" $subhead = '<h2>'._(\"Manager\").' '.$managerdisplay.'</h2>';\n $delURL = '?display=manager&managerdisplay='.$managerdisplay.'&action=delete';\n //get details for thi... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [71, 5], "buggy_code_start_loc": [70, 4], "filenames": ["Manager.class.php", "views/form.php"], "fixing_code_end_loc": [71, 5], "fixing_code_start_loc": [70, 4], "message": "An issue was discovered in Manager 13.x before 13.0.2.6 and 15.x before 15.0.6 before FreePBX 14.0.10.3. In the Manager mod... | 276 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* -*- C++ -*-\n * Copyright 2019 LibRaw LLC (info@libraw.org)\n *",
" LibRaw is free software; you can redistribute it and/or modify\n it under the terms of the one of two licenses as you choose:",
"1. GNU LESSER GENERAL PUBLIC LICENSE version 2.1\n (See file LICENSE.LGPL provided in LibRaw distribution arc... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [215, 710], "buggy_code_start_loc": [215, 181], "filenames": ["internal/x3f_tools.h", "src/x3f/x3f_utils_patched.cpp"], "fixing_code_end_loc": [217, 714], "fixing_code_start_loc": [216, 182], "message": "In LibRaw, there is an out-of-bounds write vulnerability within the \"new_node()\" function (... | 277 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* -*- C++ -*-\n * Copyright 2019 LibRaw LLC (info@libraw.org)\n *",
" LibRaw is free software; you can redistribute it and/or modify\n it under the terms of the one of two licenses as you choose:",
"1. GNU LESSER GENERAL PUBLIC LICENSE version 2.1\n (See file LICENSE.LGPL provided in LibRaw distribution arc... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [215, 710], "buggy_code_start_loc": [215, 181], "filenames": ["internal/x3f_tools.h", "src/x3f/x3f_utils_patched.cpp"], "fixing_code_end_loc": [217, 714], "fixing_code_start_loc": [216, 182], "message": "In LibRaw, there is an out-of-bounds write vulnerability within the \"new_node()\" function (... | 277 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* Library for accessing X3F Files\n----------------------------------------------------------------\nBSD-style License\n----------------------------------------------------------------",
"* Copyright (c) 2010, Roland Karlsson (roland@proxel.se)\n* All rights reserved.\n*\n* Redistribution and use in source and ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [215, 710], "buggy_code_start_loc": [215, 181], "filenames": ["internal/x3f_tools.h", "src/x3f/x3f_utils_patched.cpp"], "fixing_code_end_loc": [217, 714], "fixing_code_start_loc": [216, 182], "message": "In LibRaw, there is an out-of-bounds write vulnerability within the \"new_node()\" function (... | 277 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* Library for accessing X3F Files\n----------------------------------------------------------------\nBSD-style License\n----------------------------------------------------------------",
"* Copyright (c) 2010, Roland Karlsson (roland@proxel.se)\n* All rights reserved.\n*\n* Redistribution and use in source and ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [215, 710], "buggy_code_start_loc": [215, 181], "filenames": ["internal/x3f_tools.h", "src/x3f/x3f_utils_patched.cpp"], "fixing_code_end_loc": [217, 714], "fixing_code_start_loc": [216, 182], "message": "In LibRaw, there is an out-of-bounds write vulnerability within the \"new_node()\" function (... | 277 |
Determine whether the {function_name} code is vulnerable or not. | [
"",
"2018-10-17 Stuart Caie <kyzer@cabextract.org.uk>\n \n * chmd_read_headers(): again reject files with blank filenames, this\n time because their 1st or 2nd byte is null, not because their length\n is zero. Thanks again to Hanno Böck for finding the issue.",
"2018-10-16 Stuart Caie <... | [
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [0, 105], "buggy_code_start_loc": [0, 2], "filenames": ["libmspack/ChangeLog", "libmspack/mspack/cab.h"], "fixing_code_end_loc": [9, 113], "fixing_code_start_loc": [1, 2], "message": "In mspack/cab.h in libmspack before 0.8alpha and cabextract before 1.8, the CAB block input buffer is one byte to... | 278 |
Determine whether the {function_name} code is vulnerable or not. | [
"2018-10-17 Stuart Caie <kyzer@cabextract.org.uk>",
"\t* cab.h: Make the CAB block input buffer one byte larger, to allow\n\ta maximum-allowed-size input block and the special extra byte added\n\tafter the block by cabd_sys_read_block to help Quantum alignment.\n\tThanks to Henri Salo for reporting this.",
"",... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [0, 105], "buggy_code_start_loc": [0, 2], "filenames": ["libmspack/ChangeLog", "libmspack/mspack/cab.h"], "fixing_code_end_loc": [9, 113], "fixing_code_start_loc": [1, 2], "message": "In mspack/cab.h in libmspack before 0.8alpha and cabextract before 1.8, the CAB block input buffer is one byte to... | 278 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* This file is part of libmspack.",
" * (C) 2003-2004 Stuart Caie.",
" *\n * libmspack is free software; you can redistribute it and/or modify it under\n * the terms of the GNU Lesser General Public License (LGPL) version 2.1\n *\n * For further details, see the file COPYING.LIB distributed with libmspack\n *... | [
1,
0,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [0, 105], "buggy_code_start_loc": [0, 2], "filenames": ["libmspack/ChangeLog", "libmspack/mspack/cab.h"], "fixing_code_end_loc": [9, 113], "fixing_code_start_loc": [1, 2], "message": "In mspack/cab.h in libmspack before 0.8alpha and cabextract before 1.8, the CAB block input buffer is one byte to... | 278 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* This file is part of libmspack.",
" * (C) 2003-2018 Stuart Caie.",
" *\n * libmspack is free software; you can redistribute it and/or modify it under\n * the terms of the GNU Lesser General Public License (LGPL) version 2.1\n *\n * For further details, see the file COPYING.LIB distributed with libmspack\n *... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [0, 105], "buggy_code_start_loc": [0, 2], "filenames": ["libmspack/ChangeLog", "libmspack/mspack/cab.h"], "fixing_code_end_loc": [9, 113], "fixing_code_start_loc": [1, 2], "message": "In mspack/cab.h in libmspack before 0.8alpha and cabextract before 1.8, the CAB block input buffer is one byte to... | 278 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%\n% %\n% %\n% ... | [
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [175], "buggy_code_start_loc": [174], "filenames": ["coders/art.c"], "fixing_code_end_loc": [178], "fixing_code_start_loc": [174], "message": "In ImageMagick 7.0.5-5, the ReadARTImage function in coders/art.c allows attackers to cause a denial of service (memory leak) via a crafted .art file.", "... | 279 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%\n% %\n% %\n% ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [175], "buggy_code_start_loc": [174], "filenames": ["coders/art.c"], "fixing_code_end_loc": [178], "fixing_code_start_loc": [174], "message": "In ImageMagick 7.0.5-5, the ReadARTImage function in coders/art.c allows attackers to cause a denial of service (memory leak) via a crafted .art file.", "... | 279 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2006, Intel Corporation.\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the terms and conditions of the GNU General Public License,\n * version 2, as published by the Free Software Foundation.\n *\n * This program is distributed in the hope it will be... | [
1,
1,
1,
1,
1,
0,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [135], "buggy_code_start_loc": [46], "filenames": ["virt/kvm/iommu.c"], "fixing_code_end_loc": [135], "fixing_code_start_loc": [46], "message": "The kvm_iommu_map_pages function in virt/kvm/iommu.c in the Linux kernel through 3.17.2 miscalculates the number of pages during the handling of a mappi... | 280 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2006, Intel Corporation.\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the terms and conditions of the GNU General Public License,\n * version 2, as published by the Free Software Foundation.\n *\n * This program is distributed in the hope it will be... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [135], "buggy_code_start_loc": [46], "filenames": ["virt/kvm/iommu.c"], "fixing_code_end_loc": [135], "fixing_code_start_loc": [46], "message": "The kvm_iommu_map_pages function in virt/kvm/iommu.c in the Linux kernel through 3.17.2 miscalculates the number of pages during the handling of a mappi... | 280 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.