prompt
stringclasses
1 value
completions
listlengths
1
63.8k
labels
listlengths
1
63.8k
source
stringclasses
1 value
other_info
stringlengths
2.06k
101k
index
int64
0
6.83k
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\n/*\n * Functions relative to short URLs: adding, editing, etc\n * (either proper short URLs (\"http://sho.rt/abc\") or \"keywords\" (the \"abc\" part)\n */", "\n/**\n * Add a new link in the DB, either with custom keyword, or find one\n *\n * The return array will contain at least the following keys:\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 0, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [343, 41], "buggy_code_start_loc": [304, 41], "filenames": ["includes/functions-shorturls.php", "tests/tests/shorturl/shorturl.php"], "fixing_code_end_loc": [347, 45], "fixing_code_start_loc": [303, 42], "message": "yourls is vulnerable to Improper Neutralization of Input During Web Page Generati...
281
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\n/*\n * Functions relative to short URLs: adding, editing, etc\n * (either proper short URLs (\"http://sho.rt/abc\") or \"keywords\" (the \"abc\" part)\n */", "\n/**\n * Add a new link in the DB, either with custom keyword, or find one\n *\n * The return array will contain at least the following keys:\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [343, 41], "buggy_code_start_loc": [304, 41], "filenames": ["includes/functions-shorturls.php", "tests/tests/shorturl/shorturl.php"], "fixing_code_end_loc": [347, 45], "fixing_code_start_loc": [303, 42], "message": "yourls is vulnerable to Improper Neutralization of Input During Web Page Generati...
281
Determine whether the {function_name} code is vulnerable or not.
[ "<?php", "/**\n * Short URL tests\n *\n * @group shorturls\n * @since 0.1\n */", "class ShortURL_Tests extends PHPUnit\\Framework\\TestCase {", " public function test_reserved_keywords() {\n global $yourls_reserved_URL;\n $reserved = $yourls_reserved_URL[ array_rand( $yourls_reserved_URL, 1 )...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [343, 41], "buggy_code_start_loc": [304, 41], "filenames": ["includes/functions-shorturls.php", "tests/tests/shorturl/shorturl.php"], "fixing_code_end_loc": [347, 45], "fixing_code_start_loc": [303, 42], "message": "yourls is vulnerable to Improper Neutralization of Input During Web Page Generati...
281
Determine whether the {function_name} code is vulnerable or not.
[ "<?php", "/**\n * Short URL tests\n *\n * @group shorturls\n * @since 0.1\n */", "class ShortURL_Tests extends PHPUnit\\Framework\\TestCase {", " public function test_reserved_keywords() {\n global $yourls_reserved_URL;\n $reserved = $yourls_reserved_URL[ array_rand( $yourls_reserved_URL, 1 )...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [343, 41], "buggy_code_start_loc": [304, 41], "filenames": ["includes/functions-shorturls.php", "tests/tests/shorturl/shorturl.php"], "fixing_code_end_loc": [347, 45], "fixing_code_start_loc": [303, 42], "message": "yourls is vulnerable to Improper Neutralization of Input During Web Page Generati...
281
Determine whether the {function_name} code is vulnerable or not.
[ "<?php", "/**\n * ---------------------------------------------------------------------\n *\n * GLPI - Gestionnaire Libre de Parc Informatique\n *\n * http://glpi-project.org\n *\n * @copyright 2015-2022 Teclib' and contributors.\n * @copyright 2003-2014 by the INDEPNET Development Team.\n * @licence https://ww...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [7171], "buggy_code_start_loc": [6308], "filenames": ["src/Search.php"], "fixing_code_end_loc": [7178], "fixing_code_start_loc": [6309], "message": "GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk feat...
282
Determine whether the {function_name} code is vulnerable or not.
[ "<?php", "/**\n * ---------------------------------------------------------------------\n *\n * GLPI - Gestionnaire Libre de Parc Informatique\n *\n * http://glpi-project.org\n *\n * @copyright 2015-2022 Teclib' and contributors.\n * @copyright 2003-2014 by the INDEPNET Development Team.\n * @licence https://ww...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [7171], "buggy_code_start_loc": [6308], "filenames": ["src/Search.php"], "fixing_code_end_loc": [7178], "fixing_code_start_loc": [6309], "message": "GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk feat...
282
Determine whether the {function_name} code is vulnerable or not.
[ "#!/usr/bin/env python\nimport re", "import sys", "from setuptools import setup\nfrom setuptools.command.test import test as TestCommand", "install_requires = [\n # core dependencies\n 'decorator',\n 'requests >= 1.0.0',\n 'future',\n 'paste',\n 'zope.interface',\n 'repoze.who',\n 'pyc...
[ 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [20, 273, 239, 213, 454, 68, 1554], "buggy_code_start_loc": [20, 38, 39, 21, 19, 14, 9], "filenames": ["setup.py", "src/saml2/__init__.py", "src/saml2/pack.py", "src/saml2/soap.py", "tests/test_03_saml2.py", "tests/test_43_soap.py", "tests/test_51_client.py"], "fixing_code_end_loc": [22, 274, 240...
283
Determine whether the {function_name} code is vulnerable or not.
[ "#!/usr/bin/env python\nimport re", "import sys", "from setuptools import setup\nfrom setuptools.command.test import test as TestCommand", "install_requires = [\n # core dependencies\n 'decorator',\n 'requests >= 1.0.0',\n 'future',\n 'paste',\n 'zope.interface',\n 'repoze.who',\n 'pyc...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [20, 273, 239, 213, 454, 68, 1554], "buggy_code_start_loc": [20, 38, 39, 21, 19, 14, 9], "filenames": ["setup.py", "src/saml2/__init__.py", "src/saml2/pack.py", "src/saml2/soap.py", "tests/test_03_saml2.py", "tests/test_43_soap.py", "tests/test_51_client.py"], "fixing_code_end_loc": [22, 274, 240...
283
Determine whether the {function_name} code is vulnerable or not.
[ "#!/usr/bin/env python\n# -*- coding: utf-8 -*-", "\"\"\"Contains base classes representing SAML elements.", " These codes were originally written by Jeffrey Scudder for\n representing Saml elements. Takashi Matsuo had added some codes, and\n changed some. Roland Hedberg rewrote the whole thing from bo...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [20, 273, 239, 213, 454, 68, 1554], "buggy_code_start_loc": [20, 38, 39, 21, 19, 14, 9], "filenames": ["setup.py", "src/saml2/__init__.py", "src/saml2/pack.py", "src/saml2/soap.py", "tests/test_03_saml2.py", "tests/test_43_soap.py", "tests/test_51_client.py"], "fixing_code_end_loc": [22, 274, 240...
283
Determine whether the {function_name} code is vulnerable or not.
[ "#!/usr/bin/env python\n# -*- coding: utf-8 -*-", "\"\"\"Contains base classes representing SAML elements.", " These codes were originally written by Jeffrey Scudder for\n representing Saml elements. Takashi Matsuo had added some codes, and\n changed some. Roland Hedberg rewrote the whole thing from bo...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [20, 273, 239, 213, 454, 68, 1554], "buggy_code_start_loc": [20, 38, 39, 21, 19, 14, 9], "filenames": ["setup.py", "src/saml2/__init__.py", "src/saml2/pack.py", "src/saml2/soap.py", "tests/test_03_saml2.py", "tests/test_43_soap.py", "tests/test_51_client.py"], "fixing_code_end_loc": [22, 274, 240...
283
Determine whether the {function_name} code is vulnerable or not.
[ "#!/usr/bin/env python\n# -*- coding: utf-8 -*-\n#", "\"\"\"Contains classes and functions that are necessary to implement\ndifferent bindings.", "Bindings normally consists of three parts:\n- rules about what to send\n- how to package the information\n- which protocol to use\n\"\"\"\nfrom six.moves.urllib.pars...
[ 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [20, 273, 239, 213, 454, 68, 1554], "buggy_code_start_loc": [20, 38, 39, 21, 19, 14, 9], "filenames": ["setup.py", "src/saml2/__init__.py", "src/saml2/pack.py", "src/saml2/soap.py", "tests/test_03_saml2.py", "tests/test_43_soap.py", "tests/test_51_client.py"], "fixing_code_end_loc": [22, 274, 240...
283
Determine whether the {function_name} code is vulnerable or not.
[ "#!/usr/bin/env python\n# -*- coding: utf-8 -*-\n#", "\"\"\"Contains classes and functions that are necessary to implement\ndifferent bindings.", "Bindings normally consists of three parts:\n- rules about what to send\n- how to package the information\n- which protocol to use\n\"\"\"\nfrom six.moves.urllib.pars...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [20, 273, 239, 213, 454, 68, 1554], "buggy_code_start_loc": [20, 38, 39, 21, 19, 14, 9], "filenames": ["setup.py", "src/saml2/__init__.py", "src/saml2/pack.py", "src/saml2/soap.py", "tests/test_03_saml2.py", "tests/test_43_soap.py", "tests/test_51_client.py"], "fixing_code_end_loc": [22, 274, 240...
283
Determine whether the {function_name} code is vulnerable or not.
[ "#!/usr/bin/env python\n# -*- coding: utf-8 -*-\n#", "\"\"\"\nSuppport for the client part of the SAML2.0 SOAP binding.\n\"\"\"\nimport logging", "from saml2 import create_class_from_element_tree\nfrom saml2.samlp import NAMESPACE as SAMLP_NAMESPACE\nfrom saml2.schema import soapenv", "try:\n from xml.etre...
[ 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [20, 273, 239, 213, 454, 68, 1554], "buggy_code_start_loc": [20, 38, 39, 21, 19, 14, 9], "filenames": ["setup.py", "src/saml2/__init__.py", "src/saml2/pack.py", "src/saml2/soap.py", "tests/test_03_saml2.py", "tests/test_43_soap.py", "tests/test_51_client.py"], "fixing_code_end_loc": [22, 274, 240...
283
Determine whether the {function_name} code is vulnerable or not.
[ "#!/usr/bin/env python\n# -*- coding: utf-8 -*-\n#", "\"\"\"\nSuppport for the client part of the SAML2.0 SOAP binding.\n\"\"\"\nimport logging", "from saml2 import create_class_from_element_tree\nfrom saml2.samlp import NAMESPACE as SAMLP_NAMESPACE\nfrom saml2.schema import soapenv", "try:\n from xml.etre...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [20, 273, 239, 213, 454, 68, 1554], "buggy_code_start_loc": [20, 38, 39, 21, 19, 14, 9], "filenames": ["setup.py", "src/saml2/__init__.py", "src/saml2/pack.py", "src/saml2/soap.py", "tests/test_03_saml2.py", "tests/test_43_soap.py", "tests/test_51_client.py"], "fixing_code_end_loc": [22, 274, 240...
283
Determine whether the {function_name} code is vulnerable or not.
[ "#!/usr/bin/env python", "import saml2", "from saml2 import create_class_from_xml_string, class_name, make_vals, md\nfrom saml2.saml import NameID, Issuer, SubjectLocality, AuthnContextClassRef\nfrom saml2.saml import SubjectConfirmationData, SubjectConfirmation\nfrom saml2.saml import Attribute", "from py.te...
[ 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [20, 273, 239, 213, 454, 68, 1554], "buggy_code_start_loc": [20, 38, 39, 21, 19, 14, 9], "filenames": ["setup.py", "src/saml2/__init__.py", "src/saml2/pack.py", "src/saml2/soap.py", "tests/test_03_saml2.py", "tests/test_43_soap.py", "tests/test_51_client.py"], "fixing_code_end_loc": [22, 274, 240...
283
Determine whether the {function_name} code is vulnerable or not.
[ "#!/usr/bin/env python", "import saml2", "from saml2 import create_class_from_xml_string, class_name, make_vals, md\nfrom saml2.saml import NameID, Issuer, SubjectLocality, AuthnContextClassRef\nfrom saml2.saml import SubjectConfirmationData, SubjectConfirmation\nfrom saml2.saml import Attribute", "from py.te...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [20, 273, 239, 213, 454, 68, 1554], "buggy_code_start_loc": [20, 38, 39, 21, 19, 14, 9], "filenames": ["setup.py", "src/saml2/__init__.py", "src/saml2/pack.py", "src/saml2/soap.py", "tests/test_03_saml2.py", "tests/test_43_soap.py", "tests/test_51_client.py"], "fixing_code_end_loc": [22, 274, 240...
283
Determine whether the {function_name} code is vulnerable or not.
[ "#!/usr/bin/env python", "try:\n from xml.etree import cElementTree as ElementTree\n if ElementTree.VERSION < '1.3.0':\n # cElementTree has no support for register_namespace\n # neither _namespace_map, thus we sacrify performance\n # for correctness\n from xml.etree import Elemen...
[ 1, 1, 0, 1, 0, 1, 1, 1, 1, 1, 0 ]
PreciseBugs
{"buggy_code_end_loc": [20, 273, 239, 213, 454, 68, 1554], "buggy_code_start_loc": [20, 38, 39, 21, 19, 14, 9], "filenames": ["setup.py", "src/saml2/__init__.py", "src/saml2/pack.py", "src/saml2/soap.py", "tests/test_03_saml2.py", "tests/test_43_soap.py", "tests/test_51_client.py"], "fixing_code_end_loc": [22, 274, 240...
283
Determine whether the {function_name} code is vulnerable or not.
[ "#!/usr/bin/env python", "try:\n from xml.etree import cElementTree as ElementTree\n if ElementTree.VERSION < '1.3.0':\n # cElementTree has no support for register_namespace\n # neither _namespace_map, thus we sacrify performance\n # for correctness\n from xml.etree import Elemen...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [20, 273, 239, 213, 454, 68, 1554], "buggy_code_start_loc": [20, 38, 39, 21, 19, 14, 9], "filenames": ["setup.py", "src/saml2/__init__.py", "src/saml2/pack.py", "src/saml2/soap.py", "tests/test_03_saml2.py", "tests/test_43_soap.py", "tests/test_51_client.py"], "fixing_code_end_loc": [22, 274, 240...
283
Determine whether the {function_name} code is vulnerable or not.
[ "#!/usr/bin/env python\n# -*- coding: utf-8 -*-", "import base64\nimport uuid\nimport six\nfrom future.backports.urllib.parse import parse_qs\nfrom future.backports.urllib.parse import urlencode\nfrom future.backports.urllib.parse import urlparse", "", "\nfrom saml2.argtree import add_path\nfrom saml2.cert im...
[ 1, 1, 0, 1, 1, 0, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [20, 273, 239, 213, 454, 68, 1554], "buggy_code_start_loc": [20, 38, 39, 21, 19, 14, 9], "filenames": ["setup.py", "src/saml2/__init__.py", "src/saml2/pack.py", "src/saml2/soap.py", "tests/test_03_saml2.py", "tests/test_43_soap.py", "tests/test_51_client.py"], "fixing_code_end_loc": [22, 274, 240...
283
Determine whether the {function_name} code is vulnerable or not.
[ "#!/usr/bin/env python\n# -*- coding: utf-8 -*-", "import base64\nimport uuid\nimport six\nfrom future.backports.urllib.parse import parse_qs\nfrom future.backports.urllib.parse import urlencode\nfrom future.backports.urllib.parse import urlparse", "from pytest import raises", "\nfrom saml2.argtree import add...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [20, 273, 239, 213, 454, 68, 1554], "buggy_code_start_loc": [20, 38, 39, 21, 19, 14, 9], "filenames": ["setup.py", "src/saml2/__init__.py", "src/saml2/pack.py", "src/saml2/soap.py", "tests/test_03_saml2.py", "tests/test_43_soap.py", "tests/test_51_client.py"], "fixing_code_end_loc": [22, 274, 240...
283
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\n/* For licensing terms, see /license.txt */", "/**\n * @package chamilo.social\n *\n * @author Julio Montoya <gugli100@gmail.com>\n */\n$cidReset = true;", "require_once __DIR__.'/../inc/global.inc.php';\n$ajax_url = api_get_path(WEB_AJAX_PATH).'message.ajax.php';\napi_block_anonymous_users();", "if (...
[ 1, 1, 1, 1, 1, 0, 0, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [205], "buggy_code_start_loc": [26], "filenames": ["main/social/search.php"], "fixing_code_end_loc": [205], "fixing_code_start_loc": [26], "message": "A Chamilo LMS 1.11.14 reflected XSS vulnerability exists in main/social/search.php=q URI (social network search feature).", "other": {"cve": {"cis...
284
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\n/* For licensing terms, see /license.txt */", "/**\n * @package chamilo.social\n *\n * @author Julio Montoya <gugli100@gmail.com>\n */\n$cidReset = true;", "require_once __DIR__.'/../inc/global.inc.php';\n$ajax_url = api_get_path(WEB_AJAX_PATH).'message.ajax.php';\napi_block_anonymous_users();", "if (...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [205], "buggy_code_start_loc": [26], "filenames": ["main/social/search.php"], "fixing_code_end_loc": [205], "fixing_code_start_loc": [26], "message": "A Chamilo LMS 1.11.14 reflected XSS vulnerability exists in main/social/search.php=q URI (social network search feature).", "other": {"cve": {"cis...
284
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\nnamespace um\\core;", "// Exit if accessed directly\nif ( ! defined( 'ABSPATH' ) ) exit;", "if ( ! class_exists( 'um\\core\\Shortcodes' ) ) {", "\n\t/**\n\t * Class Shortcodes\n\t * @package um\\core\n\t */\n\tclass Shortcodes {", "\t\tvar $profile_role = '';", "\t\t/**\n\t\t * Shortcodes construc...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [290], "buggy_code_start_loc": [279], "filenames": ["includes/core/class-shortcodes.php"], "fixing_code_end_loc": [292], "fixing_code_start_loc": [278], "message": "A vulnerability, which was classified as critical, has been found in Ultimate Member Plugin up to 2.5.0. This issue affects the func...
285
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\nnamespace um\\core;", "// Exit if accessed directly\nif ( ! defined( 'ABSPATH' ) ) exit;", "if ( ! class_exists( 'um\\core\\Shortcodes' ) ) {", "\n\t/**\n\t * Class Shortcodes\n\t * @package um\\core\n\t */\n\tclass Shortcodes {", "\t\tvar $profile_role = '';", "\t\t/**\n\t\t * Shortcodes construc...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [290], "buggy_code_start_loc": [279], "filenames": ["includes/core/class-shortcodes.php"], "fixing_code_end_loc": [292], "fixing_code_start_loc": [278], "message": "A vulnerability, which was classified as critical, has been found in Ultimate Member Plugin up to 2.5.0. This issue affects the func...
285
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\nnamespace Api\\Model;\nuse Api\\Model\\BaseModel;\nuse AsyncAws\\S3\\S3Client;", "/**\n * \n * @author star7th \n */\nclass AttachmentModel extends BaseModel {", "\tProtected $autoCheckFields = false; //一定要关闭字段缓存,不然会报找不到表的错误", "\t//获取某个用户的当前已使用附件流量\n\tpublic function getUserFlow($uid){\n\t\t$mon...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [333], "buggy_code_start_loc": [332], "filenames": ["server/Application/Api/Model/AttachmentModel.class.php"], "fixing_code_end_loc": [333], "fixing_code_start_loc": [332], "message": "Stored XSS via File Upload in GitHub repository star7th/showdoc prior to v.2.10.4.", "other": {"cve": {"cisaActi...
286
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\nnamespace Api\\Model;\nuse Api\\Model\\BaseModel;\nuse AsyncAws\\S3\\S3Client;", "/**\n * \n * @author star7th \n */\nclass AttachmentModel extends BaseModel {", "\tProtected $autoCheckFields = false; //一定要关闭字段缓存,不然会报找不到表的错误", "\t//获取某个用户的当前已使用附件流量\n\tpublic function getUserFlow($uid){\n\t\t$mon...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [333], "buggy_code_start_loc": [332], "filenames": ["server/Application/Api/Model/AttachmentModel.class.php"], "fixing_code_end_loc": [333], "fixing_code_start_loc": [332], "message": "Stored XSS via File Upload in GitHub repository star7th/showdoc prior to v.2.10.4.", "other": {"cve": {"cisaActi...
286
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\n/*\ninit.php - bootloader to initialize variables\n * If the config.php file is not found then an error\n * will be displayed asking the visitor to set up the\n * config.php file.\n *\n * Will also search for config.php in the OpenDocMan parent\n * directory to allow the OpendocMan directory to remain\n * u...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0 ]
PreciseBugs
{"buggy_code_end_loc": [77], "buggy_code_start_loc": [77], "filenames": ["odm-init.php"], "fixing_code_end_loc": [79], "fixing_code_start_loc": [78], "message": "Cross-site scripting (XSS) vulnerability in odm-init.php in OpenDocMan before 1.2.7.3 allows remote authenticated users to inject arbitrary web script or HTML...
287
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\n/*\ninit.php - bootloader to initialize variables\n * If the config.php file is not found then an error\n * will be displayed asking the visitor to set up the\n * config.php file.\n *\n * Will also search for config.php in the OpenDocMan parent\n * directory to allow the OpendocMan directory to remain\n * u...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [77], "buggy_code_start_loc": [77], "filenames": ["odm-init.php"], "fixing_code_end_loc": [79], "fixing_code_start_loc": [78], "message": "Cross-site scripting (XSS) vulnerability in odm-init.php in OpenDocMan before 1.2.7.3 allows remote authenticated users to inject arbitrary web script or HTML...
287
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\n/**\n * ---------------------------------------------------------------------\n * GLPI - Gestionnaire Libre de Parc Informatique\n * Copyright (C) 2015-2021 Teclib' and contributors.\n *\n * http://glpi-project.org\n *\n * based on GLPI - Gestionnaire Libre de Parc Informatique\n * Copyright (C) 2003-2014 b...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [80, 686, 2205, 4032, 1333, 377], "buggy_code_start_loc": [79, 685, 176, 4029, 768, 377], "filenames": ["ajax/dropdownTrackingDeviceType.php", "inc/computer_item.class.php", "inc/dropdown.class.php", "inc/user.class.php", "tests/functionnal/Dropdown.php", "tests/functionnal/Session.php"], "fixing...
288
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\n/**\n * ---------------------------------------------------------------------\n * GLPI - Gestionnaire Libre de Parc Informatique\n * Copyright (C) 2015-2021 Teclib' and contributors.\n *\n * http://glpi-project.org\n *\n * based on GLPI - Gestionnaire Libre de Parc Informatique\n * Copyright (C) 2003-2014 b...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [80, 686, 2205, 4032, 1333, 377], "buggy_code_start_loc": [79, 685, 176, 4029, 768, 377], "filenames": ["ajax/dropdownTrackingDeviceType.php", "inc/computer_item.class.php", "inc/dropdown.class.php", "inc/user.class.php", "tests/functionnal/Dropdown.php", "tests/functionnal/Session.php"], "fixing...
288
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\n/**\n * ---------------------------------------------------------------------\n * GLPI - Gestionnaire Libre de Parc Informatique\n * Copyright (C) 2015-2021 Teclib' and contributors.\n *\n * http://glpi-project.org\n *\n * based on GLPI - Gestionnaire Libre de Parc Informatique\n * Copyright (C) 2003-2014 b...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [80, 686, 2205, 4032, 1333, 377], "buggy_code_start_loc": [79, 685, 176, 4029, 768, 377], "filenames": ["ajax/dropdownTrackingDeviceType.php", "inc/computer_item.class.php", "inc/dropdown.class.php", "inc/user.class.php", "tests/functionnal/Dropdown.php", "tests/functionnal/Session.php"], "fixing...
288
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\n/**\n * ---------------------------------------------------------------------\n * GLPI - Gestionnaire Libre de Parc Informatique\n * Copyright (C) 2015-2021 Teclib' and contributors.\n *\n * http://glpi-project.org\n *\n * based on GLPI - Gestionnaire Libre de Parc Informatique\n * Copyright (C) 2003-2014 b...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [80, 686, 2205, 4032, 1333, 377], "buggy_code_start_loc": [79, 685, 176, 4029, 768, 377], "filenames": ["ajax/dropdownTrackingDeviceType.php", "inc/computer_item.class.php", "inc/dropdown.class.php", "inc/user.class.php", "tests/functionnal/Dropdown.php", "tests/functionnal/Session.php"], "fixing...
288
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\n/**\n * ---------------------------------------------------------------------\n * GLPI - Gestionnaire Libre de Parc Informatique\n * Copyright (C) 2015-2021 Teclib' and contributors.\n *\n * http://glpi-project.org\n *\n * based on GLPI - Gestionnaire Libre de Parc Informatique\n * Copyright (C) 2003-2014 b...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [80, 686, 2205, 4032, 1333, 377], "buggy_code_start_loc": [79, 685, 176, 4029, 768, 377], "filenames": ["ajax/dropdownTrackingDeviceType.php", "inc/computer_item.class.php", "inc/dropdown.class.php", "inc/user.class.php", "tests/functionnal/Dropdown.php", "tests/functionnal/Session.php"], "fixing...
288
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\n/**\n * ---------------------------------------------------------------------\n * GLPI - Gestionnaire Libre de Parc Informatique\n * Copyright (C) 2015-2021 Teclib' and contributors.\n *\n * http://glpi-project.org\n *\n * based on GLPI - Gestionnaire Libre de Parc Informatique\n * Copyright (C) 2003-2014 b...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [80, 686, 2205, 4032, 1333, 377], "buggy_code_start_loc": [79, 685, 176, 4029, 768, 377], "filenames": ["ajax/dropdownTrackingDeviceType.php", "inc/computer_item.class.php", "inc/dropdown.class.php", "inc/user.class.php", "tests/functionnal/Dropdown.php", "tests/functionnal/Session.php"], "fixing...
288
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\n/**\n * ---------------------------------------------------------------------\n * GLPI - Gestionnaire Libre de Parc Informatique\n * Copyright (C) 2015-2021 Teclib' and contributors.\n *\n * http://glpi-project.org\n *\n * based on GLPI - Gestionnaire Libre de Parc Informatique\n * Copyright (C) 2003-2014 b...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [80, 686, 2205, 4032, 1333, 377], "buggy_code_start_loc": [79, 685, 176, 4029, 768, 377], "filenames": ["ajax/dropdownTrackingDeviceType.php", "inc/computer_item.class.php", "inc/dropdown.class.php", "inc/user.class.php", "tests/functionnal/Dropdown.php", "tests/functionnal/Session.php"], "fixing...
288
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\n/**\n * ---------------------------------------------------------------------\n * GLPI - Gestionnaire Libre de Parc Informatique\n * Copyright (C) 2015-2021 Teclib' and contributors.\n *\n * http://glpi-project.org\n *\n * based on GLPI - Gestionnaire Libre de Parc Informatique\n * Copyright (C) 2003-2014 b...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [80, 686, 2205, 4032, 1333, 377], "buggy_code_start_loc": [79, 685, 176, 4029, 768, 377], "filenames": ["ajax/dropdownTrackingDeviceType.php", "inc/computer_item.class.php", "inc/dropdown.class.php", "inc/user.class.php", "tests/functionnal/Dropdown.php", "tests/functionnal/Session.php"], "fixing...
288
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\n/**\n * ---------------------------------------------------------------------\n * GLPI - Gestionnaire Libre de Parc Informatique\n * Copyright (C) 2015-2021 Teclib' and contributors.\n *\n * http://glpi-project.org\n *\n * based on GLPI - Gestionnaire Libre de Parc Informatique\n * Copyright (C) 2003-2014 b...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [80, 686, 2205, 4032, 1333, 377], "buggy_code_start_loc": [79, 685, 176, 4029, 768, 377], "filenames": ["ajax/dropdownTrackingDeviceType.php", "inc/computer_item.class.php", "inc/dropdown.class.php", "inc/user.class.php", "tests/functionnal/Dropdown.php", "tests/functionnal/Session.php"], "fixing...
288
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\n/**\n * ---------------------------------------------------------------------\n * GLPI - Gestionnaire Libre de Parc Informatique\n * Copyright (C) 2015-2021 Teclib' and contributors.\n *\n * http://glpi-project.org\n *\n * based on GLPI - Gestionnaire Libre de Parc Informatique\n * Copyright (C) 2003-2014 b...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [80, 686, 2205, 4032, 1333, 377], "buggy_code_start_loc": [79, 685, 176, 4029, 768, 377], "filenames": ["ajax/dropdownTrackingDeviceType.php", "inc/computer_item.class.php", "inc/dropdown.class.php", "inc/user.class.php", "tests/functionnal/Dropdown.php", "tests/functionnal/Session.php"], "fixing...
288
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\n/**\n * ---------------------------------------------------------------------\n * GLPI - Gestionnaire Libre de Parc Informatique\n * Copyright (C) 2015-2021 Teclib' and contributors.\n *\n * http://glpi-project.org\n *\n * based on GLPI - Gestionnaire Libre de Parc Informatique\n * Copyright (C) 2003-2014 b...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [80, 686, 2205, 4032, 1333, 377], "buggy_code_start_loc": [79, 685, 176, 4029, 768, 377], "filenames": ["ajax/dropdownTrackingDeviceType.php", "inc/computer_item.class.php", "inc/dropdown.class.php", "inc/user.class.php", "tests/functionnal/Dropdown.php", "tests/functionnal/Session.php"], "fixing...
288
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\n/**\n * ---------------------------------------------------------------------\n * GLPI - Gestionnaire Libre de Parc Informatique\n * Copyright (C) 2015-2021 Teclib' and contributors.\n *\n * http://glpi-project.org\n *\n * based on GLPI - Gestionnaire Libre de Parc Informatique\n * Copyright (C) 2003-2014 b...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [80, 686, 2205, 4032, 1333, 377], "buggy_code_start_loc": [79, 685, 176, 4029, 768, 377], "filenames": ["ajax/dropdownTrackingDeviceType.php", "inc/computer_item.class.php", "inc/dropdown.class.php", "inc/user.class.php", "tests/functionnal/Dropdown.php", "tests/functionnal/Session.php"], "fixing...
288
Determine whether the {function_name} code is vulnerable or not.
[ "const _ = require('lodash')\nconst cheerio = require('cheerio')\nconst uslug = require('uslug')\nconst pageHelper = require('../../../helpers/page')\nconst URL = require('url').URL", "const mustacheRegExp = /(\\{|&#x7b;?){2}(.+?)(\\}|&#x7d;?){2}/i", "/* global WIKI */", "module.exports = {\n async render() ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [263], "buggy_code_start_loc": [263], "filenames": ["server/modules/rendering/html-core/renderer.js"], "fixing_code_end_loc": [268], "fixing_code_start_loc": [264], "message": "Wiki.js an open-source wiki app built on Node.js. Wiki.js before version 2.5.191 is vulnerable to stored cross-site scri...
289
Determine whether the {function_name} code is vulnerable or not.
[ "const _ = require('lodash')\nconst cheerio = require('cheerio')\nconst uslug = require('uslug')\nconst pageHelper = require('../../../helpers/page')\nconst URL = require('url').URL", "const mustacheRegExp = /(\\{|&#x7b;?){2}(.+?)(\\}|&#x7d;?){2}/i", "/* global WIKI */", "module.exports = {\n async render() ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [263], "buggy_code_start_loc": [263], "filenames": ["server/modules/rendering/html-core/renderer.js"], "fixing_code_end_loc": [268], "fixing_code_start_loc": [264], "message": "Wiki.js an open-source wiki app built on Node.js. Wiki.js before version 2.5.191 is vulnerable to stored cross-site scri...
289
Determine whether the {function_name} code is vulnerable or not.
[ "<?php", "##################################################\n#\n# Copyright (c) 2004-2017 OIC Group, Inc.\n#\n# This file is part of Exponent\n#\n# Exponent is free software; you can redistribute\n# it and/or modify it under the terms of the GNU\n# General Public License as published by the Free\n# Software Foun...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1 ]
PreciseBugs
{"buggy_code_end_loc": [513], "buggy_code_start_loc": [512], "filenames": ["framework/modules/file/connector/elfinder.php"], "fixing_code_end_loc": [513], "fixing_code_start_loc": [512], "message": "In Exponent CMS before 2.4.1 Patch #5, XSS in elFinder is possible in framework/modules/file/connector/elfinder.php.", "o...
290
Determine whether the {function_name} code is vulnerable or not.
[ "<?php", "##################################################\n#\n# Copyright (c) 2004-2017 OIC Group, Inc.\n#\n# This file is part of Exponent\n#\n# Exponent is free software; you can redistribute\n# it and/or modify it under the terms of the GNU\n# General Public License as published by the Free\n# Software Foun...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [513], "buggy_code_start_loc": [512], "filenames": ["framework/modules/file/connector/elfinder.php"], "fixing_code_end_loc": [513], "fixing_code_start_loc": [512], "message": "In Exponent CMS before 2.4.1 Patch #5, XSS in elFinder is possible in framework/modules/file/connector/elfinder.php.", "o...
290
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (C) 2015 Cisco Systems, Inc. and/or its affiliates. All rights reserved.\n * Copyright (C) 2013 Sourcefire, Inc.\n *\n * Authors: Steven Morgan <smorgan@sourcefire.com>\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Publi...
[ 1, 1, 1, 1, 1, 0, 1, 0, 1, 0, 1, 0, 1, 1, 1, 1, 0, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 0, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [875], "buggy_code_start_loc": [74], "filenames": ["libclamav/xar.c"], "fixing_code_end_loc": [896], "fixing_code_start_loc": [74], "message": "ClamAV version version 0.99.3 contains a Out of bounds heap memory read vulnerability in XAR parser, function xar_hash_check() that can result in Leaking...
291
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (C) 2015 Cisco Systems, Inc. and/or its affiliates. All rights reserved.\n * Copyright (C) 2013 Sourcefire, Inc.\n *\n * Authors: Steven Morgan <smorgan@sourcefire.com>\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Publi...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [875], "buggy_code_start_loc": [74], "filenames": ["libclamav/xar.c"], "fixing_code_end_loc": [896], "fixing_code_start_loc": [74], "message": "ClamAV version version 0.99.3 contains a Out of bounds heap memory read vulnerability in XAR parser, function xar_hash_check() that can result in Leaking...
291
Determine whether the {function_name} code is vulnerable or not.
[ "const middlewares = require('../lib/middlewares');\nconst AppCache = require('../lib/cache').AppCache;", "describe('middlewares', () => {\n let fakeReq, fakeRes;", " beforeEach(() => {\n fakeReq = {\n originalUrl: 'http://example.com/parse/',\n url: 'http://example.com/',\n body: {\n ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [292, 479, 90, 240, 306, 299], "buggy_code_start_loc": [161, 479, 90, 240, 306, 283], "filenames": ["spec/Middlewares.spec.js", "src/Options/Definitions.js", "src/Options/docs.js", "src/Options/index.js", "src/ParseServer.js", "src/middlewares.js"], "fixing_code_end_loc": [177, 487, 92, 244, 310,...
292
Determine whether the {function_name} code is vulnerable or not.
[ "const middlewares = require('../lib/middlewares');\nconst AppCache = require('../lib/cache').AppCache;", "describe('middlewares', () => {\n let fakeReq, fakeRes;", " beforeEach(() => {\n fakeReq = {\n originalUrl: 'http://example.com/parse/',\n url: 'http://example.com/',\n body: {\n ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [292, 479, 90, 240, 306, 299], "buggy_code_start_loc": [161, 479, 90, 240, 306, 283], "filenames": ["spec/Middlewares.spec.js", "src/Options/Definitions.js", "src/Options/docs.js", "src/Options/index.js", "src/ParseServer.js", "src/middlewares.js"], "fixing_code_end_loc": [177, 487, 92, 244, 310,...
292
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n**** GENERATED CODE ****\nThis code has been generated by resources/buildConfigDefinitions.js\nDo not edit manually, but update Options/index.js\n*/\nvar parsers = require('./parsers');", "module.exports.SchemaOptions = {\n afterMigration: {\n env: 'PARSE_SERVER_SCHEMA_AFTER_MIGRATION',\n help: 'Execu...
[ 1, 1, 0, 1 ]
PreciseBugs
{"buggy_code_end_loc": [292, 479, 90, 240, 306, 299], "buggy_code_start_loc": [161, 479, 90, 240, 306, 283], "filenames": ["spec/Middlewares.spec.js", "src/Options/Definitions.js", "src/Options/docs.js", "src/Options/index.js", "src/ParseServer.js", "src/middlewares.js"], "fixing_code_end_loc": [177, 487, 92, 244, 310,...
292
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n**** GENERATED CODE ****\nThis code has been generated by resources/buildConfigDefinitions.js\nDo not edit manually, but update Options/index.js\n*/\nvar parsers = require('./parsers');", "module.exports.SchemaOptions = {\n afterMigration: {\n env: 'PARSE_SERVER_SCHEMA_AFTER_MIGRATION',\n help: 'Execu...
[ 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [292, 479, 90, 240, 306, 299], "buggy_code_start_loc": [161, 479, 90, 240, 306, 283], "filenames": ["spec/Middlewares.spec.js", "src/Options/Definitions.js", "src/Options/docs.js", "src/Options/index.js", "src/ParseServer.js", "src/middlewares.js"], "fixing_code_end_loc": [177, 487, 92, 244, 310,...
292
Determine whether the {function_name} code is vulnerable or not.
[ "/**\n * @interface SchemaOptions\n * @property {Function} afterMigration Execute a callback after running schema migrations.\n * @property {Function} beforeMigration Execute a callback before running schema migrations.\n * @property {Any} definitions Rest representation on Parse.Schema https://docs.parseplatform.o...
[ 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [292, 479, 90, 240, 306, 299], "buggy_code_start_loc": [161, 479, 90, 240, 306, 283], "filenames": ["spec/Middlewares.spec.js", "src/Options/Definitions.js", "src/Options/docs.js", "src/Options/index.js", "src/ParseServer.js", "src/middlewares.js"], "fixing_code_end_loc": [177, 487, 92, 244, 310,...
292
Determine whether the {function_name} code is vulnerable or not.
[ "/**\n * @interface SchemaOptions\n * @property {Function} afterMigration Execute a callback after running schema migrations.\n * @property {Function} beforeMigration Execute a callback before running schema migrations.\n * @property {Any} definitions Rest representation on Parse.Schema https://docs.parseplatform.o...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [292, 479, 90, 240, 306, 299], "buggy_code_start_loc": [161, 479, 90, 240, 306, 283], "filenames": ["spec/Middlewares.spec.js", "src/Options/Definitions.js", "src/Options/docs.js", "src/Options/index.js", "src/ParseServer.js", "src/middlewares.js"], "fixing_code_end_loc": [177, 487, 92, 244, 310,...
292
Determine whether the {function_name} code is vulnerable or not.
[ "// @flow\nimport { AnalyticsAdapter } from '../Adapters/Analytics/AnalyticsAdapter';\nimport { FilesAdapter } from '../Adapters/Files/FilesAdapter';\nimport { LoggerAdapter } from '../Adapters/Logger/LoggerAdapter';\nimport { StorageAdapter } from '../Adapters/Storage/StorageAdapter';\nimport { CacheAdapter } from...
[ 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [292, 479, 90, 240, 306, 299], "buggy_code_start_loc": [161, 479, 90, 240, 306, 283], "filenames": ["spec/Middlewares.spec.js", "src/Options/Definitions.js", "src/Options/docs.js", "src/Options/index.js", "src/ParseServer.js", "src/middlewares.js"], "fixing_code_end_loc": [177, 487, 92, 244, 310,...
292
Determine whether the {function_name} code is vulnerable or not.
[ "// @flow\nimport { AnalyticsAdapter } from '../Adapters/Analytics/AnalyticsAdapter';\nimport { FilesAdapter } from '../Adapters/Files/FilesAdapter';\nimport { LoggerAdapter } from '../Adapters/Logger/LoggerAdapter';\nimport { StorageAdapter } from '../Adapters/Storage/StorageAdapter';\nimport { CacheAdapter } from...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [292, 479, 90, 240, 306, 299], "buggy_code_start_loc": [161, 479, 90, 240, 306, 283], "filenames": ["spec/Middlewares.spec.js", "src/Options/Definitions.js", "src/Options/docs.js", "src/Options/index.js", "src/ParseServer.js", "src/middlewares.js"], "fixing_code_end_loc": [177, 487, 92, 244, 310,...
292
Determine whether the {function_name} code is vulnerable or not.
[ "// ParseServer - open-source compatible API Server for Parse apps", "var batch = require('./batch'),\n bodyParser = require('body-parser'),\n express = require('express'),\n middlewares = require('./middlewares'),\n Parse = require('parse/node').Parse,\n { parse } = require('graphql'),\n path = require('pa...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [292, 479, 90, 240, 306, 299], "buggy_code_start_loc": [161, 479, 90, 240, 306, 283], "filenames": ["spec/Middlewares.spec.js", "src/Options/Definitions.js", "src/Options/docs.js", "src/Options/index.js", "src/ParseServer.js", "src/middlewares.js"], "fixing_code_end_loc": [177, 487, 92, 244, 310,...
292
Determine whether the {function_name} code is vulnerable or not.
[ "// ParseServer - open-source compatible API Server for Parse apps", "var batch = require('./batch'),\n bodyParser = require('body-parser'),\n express = require('express'),\n middlewares = require('./middlewares'),\n Parse = require('parse/node').Parse,\n { parse } = require('graphql'),\n path = require('pa...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [292, 479, 90, 240, 306, 299], "buggy_code_start_loc": [161, 479, 90, 240, 306, 283], "filenames": ["spec/Middlewares.spec.js", "src/Options/Definitions.js", "src/Options/docs.js", "src/Options/index.js", "src/ParseServer.js", "src/middlewares.js"], "fixing_code_end_loc": [177, 487, 92, 244, 310,...
292
Determine whether the {function_name} code is vulnerable or not.
[ "import AppCache from './cache';\nimport Parse from 'parse/node';\nimport auth from './Auth';\nimport Config from './Config';\nimport ClientSDK from './ClientSDK';\nimport defaultLogger from './logger';\nimport rest from './rest';\nimport MongoStorageAdapter from './Adapters/Storage/Mongo/MongoStorageAdapter';\nimp...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [292, 479, 90, 240, 306, 299], "buggy_code_start_loc": [161, 479, 90, 240, 306, 283], "filenames": ["spec/Middlewares.spec.js", "src/Options/Definitions.js", "src/Options/docs.js", "src/Options/index.js", "src/ParseServer.js", "src/middlewares.js"], "fixing_code_end_loc": [177, 487, 92, 244, 310,...
292
Determine whether the {function_name} code is vulnerable or not.
[ "import AppCache from './cache';\nimport Parse from 'parse/node';\nimport auth from './Auth';\nimport Config from './Config';\nimport ClientSDK from './ClientSDK';\nimport defaultLogger from './logger';\nimport rest from './rest';\nimport MongoStorageAdapter from './Adapters/Storage/Mongo/MongoStorageAdapter';\nimp...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [292, 479, 90, 240, 306, 299], "buggy_code_start_loc": [161, 479, 90, 240, 306, 283], "filenames": ["spec/Middlewares.spec.js", "src/Options/Definitions.js", "src/Options/docs.js", "src/Options/index.js", "src/ParseServer.js", "src/middlewares.js"], "fixing_code_end_loc": [177, 487, 92, 244, 310,...
292
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\nsession_start();\ndefine('NO_AUTH_REQUIRED',true);\n$TAB = 'RESET PASSWORD';", "if (isset($_SESSION['user'])) {\n header(\"Location: /list/user\");\n}", "// Main include\ninclude($_SERVER['DOCUMENT_ROOT'].\"/inc/main.php\");", "if ((!empty($_POST['user'])) && (empty($_POST['code']))) {\n $v_user...
[ 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [34], "buggy_code_start_loc": [33], "filenames": ["web/reset/index.php"], "fixing_code_end_loc": [34], "fixing_code_start_loc": [33], "message": "In the Password Reset Module in VESTA Control Panel through 0.9.8-25 and Hestia Control Panel before 1.1.1, Host header manipulation leads to account t...
293
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\nsession_start();\ndefine('NO_AUTH_REQUIRED',true);\n$TAB = 'RESET PASSWORD';", "if (isset($_SESSION['user'])) {\n header(\"Location: /list/user\");\n}", "// Main include\ninclude($_SERVER['DOCUMENT_ROOT'].\"/inc/main.php\");", "if ((!empty($_POST['user'])) && (empty($_POST['code']))) {\n $v_user...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [34], "buggy_code_start_loc": [33], "filenames": ["web/reset/index.php"], "fixing_code_end_loc": [34], "fixing_code_start_loc": [33], "message": "In the Password Reset Module in VESTA Control Panel through 0.9.8-25 and Hestia Control Panel before 1.1.1, Host header manipulation leads to account t...
293
Determine whether the {function_name} code is vulnerable or not.
[ "/***************************************************************************\n copyright : (C) 2002 - 2008 by Scott Wheeler\n email : wheeler@kde.org\n ***************************************************************************/", "/************************************************...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [341], "buggy_code_start_loc": [337], "filenames": ["taglib/mpeg/id3v2/id3v2framefactory.cpp"], "fixing_code_end_loc": [342], "fixing_code_start_loc": [337], "message": "In TagLib 1.11.1, the rebuildAggregateFrames function in id3v2framefactory.cpp has a pointer to cast vulnerability, which allow...
294
Determine whether the {function_name} code is vulnerable or not.
[ "/***************************************************************************\n copyright : (C) 2002 - 2008 by Scott Wheeler\n email : wheeler@kde.org\n ***************************************************************************/", "/************************************************...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [341], "buggy_code_start_loc": [337], "filenames": ["taglib/mpeg/id3v2/id3v2framefactory.cpp"], "fixing_code_end_loc": [342], "fixing_code_start_loc": [337], "message": "In TagLib 1.11.1, the rebuildAggregateFrames function in id3v2framefactory.cpp has a pointer to cast vulnerability, which allow...
294
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\n/**\n * ownCloud\n *\n * @author Tom Needham\n * @copyright 2012 Tom Needham tom@owncloud.com\n *\n * This library is free software; you can redistribute it and/or\n * modify it under the terms of the GNU AFFERO GENERAL PUBLIC LICENSE\n * License as published by the Free Software Foundation; either\n * vers...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [326], "buggy_code_start_loc": [325], "filenames": ["lib/migrate.php"], "fixing_code_end_loc": [326], "fixing_code_start_loc": [325], "message": "Incomplete blacklist vulnerability in lib/migrate.php in ownCloud before 4.0.7 allows remote attackers to execute arbitrary code by uploading a crafted...
295
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\n/**\n * ownCloud\n *\n * @author Tom Needham\n * @copyright 2012 Tom Needham tom@owncloud.com\n *\n * This library is free software; you can redistribute it and/or\n * modify it under the terms of the GNU AFFERO GENERAL PUBLIC LICENSE\n * License as published by the Free Software Foundation; either\n * vers...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [326], "buggy_code_start_loc": [325], "filenames": ["lib/migrate.php"], "fixing_code_end_loc": [326], "fixing_code_start_loc": [325], "message": "Incomplete blacklist vulnerability in lib/migrate.php in ownCloud before 4.0.7 allows remote attackers to execute arbitrary code by uploading a crafted...
295
Determine whether the {function_name} code is vulnerable or not.
[ "-*- coding: utf-8 -*-", "Changes with Apache 2.4.11\n \n *) SECURITY: CVE-2014-3583 (cve.mitre.org)\n mod_proxy_fcgi: Fix a potential crash due to buffer over-read, with \n response headers' size above 8K. [Yann Ylavic, Jeff Trawick]", " *) SECURITY: CVE-2014-3581 (cve.mitre.org)\n mod_cache: A...
[ 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [11, 114, 1760], "buggy_code_start_loc": [11, 107, 68], "filenames": ["CHANGES", "STATUS", "modules/lua/mod_lua.c"], "fixing_code_end_loc": [17, 106, 1767], "fixing_code_start_loc": [12, 106, 69], "message": "mod_lua.c in the mod_lua module in the Apache HTTP Server 2.3.x and 2.4.x through 2.4.10...
296
Determine whether the {function_name} code is vulnerable or not.
[ "-*- coding: utf-8 -*-", "Changes with Apache 2.4.11\n \n *) SECURITY: CVE-2014-3583 (cve.mitre.org)\n mod_proxy_fcgi: Fix a potential crash due to buffer over-read, with \n response headers' size above 8K. [Yann Ylavic, Jeff Trawick]", " *) SECURITY: CVE-2014-3581 (cve.mitre.org)\n mod_cache: A...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [11, 114, 1760], "buggy_code_start_loc": [11, 107, 68], "filenames": ["CHANGES", "STATUS", "modules/lua/mod_lua.c"], "fixing_code_end_loc": [17, 106, 1767], "fixing_code_start_loc": [12, 106, 69], "message": "mod_lua.c in the mod_lua module in the Apache HTTP Server 2.3.x and 2.4.x through 2.4.10...
296
Determine whether the {function_name} code is vulnerable or not.
[ "APACHE 2.4 STATUS: -*- mode: text; coding: utf-8 -*-\nLast modified at [$Date$]", "The current version of this file can be found at:", " * http://svn.apache.org/repos/asf/httpd/httpd/branches/2.4.x/STATUS", "Documentation status is maintained separately and can be found at:", " * d...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [11, 114, 1760], "buggy_code_start_loc": [11, 107, 68], "filenames": ["CHANGES", "STATUS", "modules/lua/mod_lua.c"], "fixing_code_end_loc": [17, 106, 1767], "fixing_code_start_loc": [12, 106, 69], "message": "mod_lua.c in the mod_lua module in the Apache HTTP Server 2.3.x and 2.4.x through 2.4.10...
296
Determine whether the {function_name} code is vulnerable or not.
[ "APACHE 2.4 STATUS: -*- mode: text; coding: utf-8 -*-\nLast modified at [$Date$]", "The current version of this file can be found at:", " * http://svn.apache.org/repos/asf/httpd/httpd/branches/2.4.x/STATUS", "Documentation status is maintained separately and can be found at:", " * d...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [11, 114, 1760], "buggy_code_start_loc": [11, 107, 68], "filenames": ["CHANGES", "STATUS", "modules/lua/mod_lua.c"], "fixing_code_end_loc": [17, 106, 1767], "fixing_code_start_loc": [12, 106, 69], "message": "mod_lua.c in the mod_lua module in the Apache HTTP Server 2.3.x and 2.4.x through 2.4.10...
296
Determine whether the {function_name} code is vulnerable or not.
[ "/**\n * Licensed to the Apache Software Foundation (ASF) under one or more\n * contributor license agreements. See the NOTICE file distributed with\n * this work for additional information regarding copyright ownership.\n * The ASF licenses this file to You under the Apache License, Version 2.0\n * (the \"License...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [11, 114, 1760], "buggy_code_start_loc": [11, 107, 68], "filenames": ["CHANGES", "STATUS", "modules/lua/mod_lua.c"], "fixing_code_end_loc": [17, 106, 1767], "fixing_code_start_loc": [12, 106, 69], "message": "mod_lua.c in the mod_lua module in the Apache HTTP Server 2.3.x and 2.4.x through 2.4.10...
296
Determine whether the {function_name} code is vulnerable or not.
[ "/**\n * Licensed to the Apache Software Foundation (ASF) under one or more\n * contributor license agreements. See the NOTICE file distributed with\n * this work for additional information regarding copyright ownership.\n * The ASF licenses this file to You under the Apache License, Version 2.0\n * (the \"License...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [11, 114, 1760], "buggy_code_start_loc": [11, 107, 68], "filenames": ["CHANGES", "STATUS", "modules/lua/mod_lua.c"], "fixing_code_end_loc": [17, 106, 1767], "fixing_code_start_loc": [12, 106, 69], "message": "mod_lua.c in the mod_lua module in the Apache HTTP Server 2.3.x and 2.4.x through 2.4.10...
296
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2008-2015, Dave Benson and the protobuf-c authors.\n * All rights reserved.\n *\n * Redistribution and use in source and binary forms, with or without\n * modification, are permitted provided that the following conditions are\n * met:\n *\n * * Redistributions of source code must retain th...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [2610], "buggy_code_start_loc": [2606], "filenames": ["protobuf-c/protobuf-c.c"], "fixing_code_end_loc": [2613], "fixing_code_start_loc": [2606], "message": "protobuf-c before 1.4.1 has an unsigned integer overflow in parse_required_member.", "other": {"cve": {"cisaActionDue": null, "cisaExploitA...
297
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2008-2015, Dave Benson and the protobuf-c authors.\n * All rights reserved.\n *\n * Redistribution and use in source and binary forms, with or without\n * modification, are permitted provided that the following conditions are\n * met:\n *\n * * Redistributions of source code must retain th...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [2610], "buggy_code_start_loc": [2606], "filenames": ["protobuf-c/protobuf-c.c"], "fixing_code_end_loc": [2613], "fixing_code_start_loc": [2606], "message": "protobuf-c before 1.4.1 has an unsigned integer overflow in parse_required_member.", "other": {"cve": {"cisaActionDue": null, "cisaExploitA...
297
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * History:\n * Started: Aug 9 by Lawrence Foard (entropy@world.std.com),\n * to allow user process control of SCSI devices.\n * Development Sponsored by Killy Corp. NY NY\n *\n * Original driver (sg.c):\n * Copyright (C) 1992 Lawrence Foard\n * Version 2 and 3 extensions to driver:\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [1745], "buggy_code_start_loc": [1745], "filenames": ["drivers/scsi/sg.c"], "fixing_code_end_loc": [1749], "fixing_code_start_loc": [1746], "message": "Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel 2.6.x through 4.x before 4.1 allows local users to cause a...
298
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * History:\n * Started: Aug 9 by Lawrence Foard (entropy@world.std.com),\n * to allow user process control of SCSI devices.\n * Development Sponsored by Killy Corp. NY NY\n *\n * Original driver (sg.c):\n * Copyright (C) 1992 Lawrence Foard\n * Version 2 and 3 extensions to driver:\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [1745], "buggy_code_start_loc": [1745], "filenames": ["drivers/scsi/sg.c"], "fixing_code_end_loc": [1749], "fixing_code_start_loc": [1746], "message": "Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel 2.6.x through 4.x before 4.1 allows local users to cause a...
298
Determine whether the {function_name} code is vulnerable or not.
[ "## Parse Server Changelog", "### master", "[Full Changelog](https://github.com/parse-community/parse-server/compare/4.5.0...master)", "\n### 4.5.0\n[Full Changelog](https://github.com/parse-community/parse-server/compare/4.4.0...4.5.0)", "__BREAKING CHANGES:__\n- FIX: Consistent casing for afterLiveQueryEv...
[ 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [5, 2430, 857], "buggy_code_start_loc": [4, 2377, 857], "filenames": ["CHANGELOG.md", "spec/ParseUser.spec.js", "src/RestWrite.js"], "fixing_code_end_loc": [10, 2434, 862], "fixing_code_start_loc": [4, 2377, 858], "message": "Parse Server is an open source backend that can be deployed to any infr...
299
Determine whether the {function_name} code is vulnerable or not.
[ "## Parse Server Changelog", "### master", "[Full Changelog](https://github.com/parse-community/parse-server/compare/4.5.1...master)", "### 4.5.1\n[Full Changelog](https://github.com/parse-community/parse-server/compare/4.5.0...4.5.1)", "- SECURITY FIX: Fixes incorrect session property `authProvider: passwo...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [5, 2430, 857], "buggy_code_start_loc": [4, 2377, 857], "filenames": ["CHANGELOG.md", "spec/ParseUser.spec.js", "src/RestWrite.js"], "fixing_code_end_loc": [10, 2434, 862], "fixing_code_start_loc": [4, 2377, 858], "message": "Parse Server is an open source backend that can be deployed to any infr...
299
Determine whether the {function_name} code is vulnerable or not.
[ "// This is a port of the test suite:\n// hungry/js/test/parse_user_test.js\n//\n// Things that we didn't port:\n// Tests that involve revocable sessions.\n// Tests that involve sending password reset emails.", "'use strict';", "const MongoStorageAdapter = require('../lib/Adapters/Storage/Mongo/MongoStorageAdap...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [5, 2430, 857], "buggy_code_start_loc": [4, 2377, 857], "filenames": ["CHANGELOG.md", "spec/ParseUser.spec.js", "src/RestWrite.js"], "fixing_code_end_loc": [10, 2434, 862], "fixing_code_start_loc": [4, 2377, 858], "message": "Parse Server is an open source backend that can be deployed to any infr...
299
Determine whether the {function_name} code is vulnerable or not.
[ "// This is a port of the test suite:\n// hungry/js/test/parse_user_test.js\n//\n// Things that we didn't port:\n// Tests that involve revocable sessions.\n// Tests that involve sending password reset emails.", "'use strict';", "const MongoStorageAdapter = require('../lib/Adapters/Storage/Mongo/MongoStorageAdap...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [5, 2430, 857], "buggy_code_start_loc": [4, 2377, 857], "filenames": ["CHANGELOG.md", "spec/ParseUser.spec.js", "src/RestWrite.js"], "fixing_code_end_loc": [10, 2434, 862], "fixing_code_start_loc": [4, 2377, 858], "message": "Parse Server is an open source backend that can be deployed to any infr...
299
Determine whether the {function_name} code is vulnerable or not.
[ "// A RestWrite encapsulates everything we need to run an operation\n// that writes to the database.\n// This could be either a \"create\" or an \"update\".", "var SchemaController = require('./Controllers/SchemaController');\nvar deepcopy = require('deepcopy');", "const Auth = require('./Auth');\nvar cryptoUti...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [5, 2430, 857], "buggy_code_start_loc": [4, 2377, 857], "filenames": ["CHANGELOG.md", "spec/ParseUser.spec.js", "src/RestWrite.js"], "fixing_code_end_loc": [10, 2434, 862], "fixing_code_start_loc": [4, 2377, 858], "message": "Parse Server is an open source backend that can be deployed to any infr...
299
Determine whether the {function_name} code is vulnerable or not.
[ "// A RestWrite encapsulates everything we need to run an operation\n// that writes to the database.\n// This could be either a \"create\" or an \"update\".", "var SchemaController = require('./Controllers/SchemaController');\nvar deepcopy = require('deepcopy');", "const Auth = require('./Auth');\nvar cryptoUti...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [5, 2430, 857], "buggy_code_start_loc": [4, 2377, 857], "filenames": ["CHANGELOG.md", "spec/ParseUser.spec.js", "src/RestWrite.js"], "fixing_code_end_loc": [10, 2434, 862], "fixing_code_start_loc": [4, 2377, 858], "message": "Parse Server is an open source backend that can be deployed to any infr...
299
Determine whether the {function_name} code is vulnerable or not.
[ "/* hivex - Windows Registry \"hive\" extraction library.\n * Copyright (C) 2009-2011 Red Hat Inc.\n * Derived from code by Petter Nordahl-Hagen under a compatible license:\n * Copyright (c) 1997-2007 Petter Nordahl-Hagen.\n * Derived from code by Markus Stephany under a compatible license:\n * Copyright (c) 20...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [105], "buggy_code_start_loc": [105], "filenames": ["lib/handle.c"], "fixing_code_end_loc": [113], "fixing_code_start_loc": [106], "message": "lib/handle.c in Hivex before 1.3.11 allows local users to execute arbitrary code and gain privileges via a small hive files, which triggers an out-of-boun...
300
Determine whether the {function_name} code is vulnerable or not.
[ "/* hivex - Windows Registry \"hive\" extraction library.\n * Copyright (C) 2009-2011 Red Hat Inc.\n * Derived from code by Petter Nordahl-Hagen under a compatible license:\n * Copyright (c) 1997-2007 Petter Nordahl-Hagen.\n * Derived from code by Markus Stephany under a compatible license:\n * Copyright (c) 20...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [105], "buggy_code_start_loc": [105], "filenames": ["lib/handle.c"], "fixing_code_end_loc": [113], "fixing_code_start_loc": [106], "message": "lib/handle.c in Hivex before 1.3.11 allows local users to execute arbitrary code and gain privileges via a small hive files, which triggers an out-of-boun...
300
Determine whether the {function_name} code is vulnerable or not.
[ "/* Copyright 2019 The TensorFlow Authors. All Rights Reserved.", "Licensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at", " http://www.apache.org/licenses/LICENSE-2.0", "Unless required b...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [158], "buggy_code_start_loc": [158], "filenames": ["tensorflow/core/kernels/ragged_tensor_to_variant_op.cc"], "fixing_code_end_loc": [165], "fixing_code_start_loc": [159], "message": "TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can caus...
301
Determine whether the {function_name} code is vulnerable or not.
[ "/* Copyright 2019 The TensorFlow Authors. All Rights Reserved.", "Licensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at", " http://www.apache.org/licenses/LICENSE-2.0", "Unless required b...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [158], "buggy_code_start_loc": [158], "filenames": ["tensorflow/core/kernels/ragged_tensor_to_variant_op.cc"], "fixing_code_end_loc": [165], "fixing_code_start_loc": [159], "message": "TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can caus...
301
Determine whether the {function_name} code is vulnerable or not.
[ "/****************************************************************************\n *\n * Copyright (C) 2006,2007 A.Kleine\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free Software Foundation; either v...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [3214], "buggy_code_start_loc": [3205], "filenames": ["util/decompile.c"], "fixing_code_end_loc": [3213], "fixing_code_start_loc": [3204], "message": "Ming (aka libming) 0.4.8 has a heap buffer overflow and underflow in the decompileCAST function in util/decompile.c in libutil.a. Remote attackers...
302
Determine whether the {function_name} code is vulnerable or not.
[ "/****************************************************************************\n *\n * Copyright (C) 2006,2007 A.Kleine\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free Software Foundation; either v...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [3214], "buggy_code_start_loc": [3205], "filenames": ["util/decompile.c"], "fixing_code_end_loc": [3213], "fixing_code_start_loc": [3204], "message": "Ming (aka libming) 0.4.8 has a heap buffer overflow and underflow in the decompileCAST function in util/decompile.c in libutil.a. Remote attackers...
302
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Quicktime Video (RPZA) Video Decoder\n * Copyright (C) 2003 the ffmpeg project\n *\n * This file is part of FFmpeg.\n *\n * FFmpeg is free software; you can redistribute it and/or\n * modify it under the terms of the GNU Lesser General Public\n * License as published by the Free Software Foundation; either\...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 0, 1, 1, 1, 1, 1, 1, 1, 0, 1, 0, 1, 1, 0, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [223], "buggy_code_start_loc": [88], "filenames": ["libavcodec/rpza.c"], "fixing_code_end_loc": [222], "fixing_code_start_loc": [88], "message": "The rpza_decode_stream function in libavcodec/rpza.c in FFmpeg before 2.1 does not properly maintain a pointer to pixel data, which allows remote attac...
303
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Quicktime Video (RPZA) Video Decoder\n * Copyright (C) 2003 the ffmpeg project\n *\n * This file is part of FFmpeg.\n *\n * FFmpeg is free software; you can redistribute it and/or\n * modify it under the terms of the GNU Lesser General Public\n * License as published by the Free Software Foundation; either\...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [223], "buggy_code_start_loc": [88], "filenames": ["libavcodec/rpza.c"], "fixing_code_end_loc": [222], "fixing_code_start_loc": [88], "message": "The rpza_decode_stream function in libavcodec/rpza.c in FFmpeg before 2.1 does not properly maintain a pointer to pixel data, which allows remote attac...
303
Determine whether the {function_name} code is vulnerable or not.
[ "package server", "import (\n\t\"fmt\"\n\t\"net/http\"\n\t\"strconv\"", "\t\"github.com/usememos/memos/api\"\n\t\"github.com/usememos/memos/common\"", "\t\"github.com/gorilla/sessions\"\n\t\"github.com/labstack/echo-contrib/session\"\n\t\"github.com/labstack/echo/v4\"\n)", "var (\n\tuserIDContextKey = \"use...
[ 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [29, 36], "buggy_code_start_loc": [29, 36], "filenames": ["server/acl.go", "server/server.go"], "fixing_code_end_loc": [31, 41], "fixing_code_start_loc": [30, 37], "message": "Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.9.1.", "other": {"cve": {"cisaActionDue"...
304
Determine whether the {function_name} code is vulnerable or not.
[ "package server", "import (\n\t\"fmt\"\n\t\"net/http\"\n\t\"strconv\"", "\t\"github.com/usememos/memos/api\"\n\t\"github.com/usememos/memos/common\"", "\t\"github.com/gorilla/sessions\"\n\t\"github.com/labstack/echo-contrib/session\"\n\t\"github.com/labstack/echo/v4\"\n)", "var (\n\tuserIDContextKey = \"use...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [29, 36], "buggy_code_start_loc": [29, 36], "filenames": ["server/acl.go", "server/server.go"], "fixing_code_end_loc": [31, 41], "fixing_code_start_loc": [30, 37], "message": "Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.9.1.", "other": {"cve": {"cisaActionDue"...
304
Determine whether the {function_name} code is vulnerable or not.
[ "package server", "import (\n\t\"fmt\"\n\t\"time\"", "\t\"github.com/usememos/memos/server/profile\"\n\t\"github.com/usememos/memos/store\"", "\t\"github.com/gorilla/securecookie\"\n\t\"github.com/gorilla/sessions\"\n\t\"github.com/labstack/echo-contrib/session\"\n\t\"github.com/labstack/echo/v4\"\n\t\"github...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [29, 36], "buggy_code_start_loc": [29, 36], "filenames": ["server/acl.go", "server/server.go"], "fixing_code_end_loc": [31, 41], "fixing_code_start_loc": [30, 37], "message": "Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.9.1.", "other": {"cve": {"cisaActionDue"...
304
Determine whether the {function_name} code is vulnerable or not.
[ "package server", "import (\n\t\"fmt\"\n\t\"time\"", "\t\"github.com/usememos/memos/server/profile\"\n\t\"github.com/usememos/memos/store\"", "\t\"github.com/gorilla/securecookie\"\n\t\"github.com/gorilla/sessions\"\n\t\"github.com/labstack/echo-contrib/session\"\n\t\"github.com/labstack/echo/v4\"\n\t\"github...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [29, 36], "buggy_code_start_loc": [29, 36], "filenames": ["server/acl.go", "server/server.go"], "fixing_code_end_loc": [31, 41], "fixing_code_start_loc": [30, 37], "message": "Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.9.1.", "other": {"cve": {"cisaActionDue"...
304
Determine whether the {function_name} code is vulnerable or not.
[ "package api", "// Visibility is the type of a visibility.\ntype Visibility string", "const (\n\t// Public is the PUBLIC visibility.\n\tPublic Visibility = \"PUBLIC\"\n\t// Protected is the PROTECTED visibility.\n\tProtected Visibility = \"PROTECTED\"\n\t// Private is the PRIVATE visibility.\n\tPrivate Visibili...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 0, 1, 0, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [81, 21, 12, 24, 20, 11, 54, 118, 545, 229, 127, 131, 108, 203], "buggy_code_start_loc": [49, 11, 11, 23, 19, 10, 53, 87, 27, 58, 24, 79, 26, 32], "filenames": ["api/memo.go", "api/memo_organizer.go", "api/memo_resource.go", "api/resource.go", "api/shortcut.go", "api/tag.go", "api/user_setting.go...
305
Determine whether the {function_name} code is vulnerable or not.
[ "package api", "// Visibility is the type of a visibility.\ntype Visibility string", "const (\n\t// Public is the PUBLIC visibility.\n\tPublic Visibility = \"PUBLIC\"\n\t// Protected is the PROTECTED visibility.\n\tProtected Visibility = \"PROTECTED\"\n\t// Private is the PRIVATE visibility.\n\tPrivate Visibili...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [81, 21, 12, 24, 20, 11, 54, 118, 545, 229, 127, 131, 108, 203], "buggy_code_start_loc": [49, 11, 11, 23, 19, 10, 53, 87, 27, 58, 24, 79, 26, 32], "filenames": ["api/memo.go", "api/memo_organizer.go", "api/memo_resource.go", "api/resource.go", "api/shortcut.go", "api/tag.go", "api/user_setting.go...
305
Determine whether the {function_name} code is vulnerable or not.
[ "package api", "type MemoOrganizer struct {\n\tID int", "\t// Domain specific fields\n\tMemoID int\n\tUserID int\n\tPinned bool\n}\n", "", "type MemoOrganizerFind struct {\n\tMemoID int\n\tUserID int", "}", "type MemoOrganizerUpsert struct {\n\tMemoID int\n\tUserID int\n\tPinned bool `json:\"pinned\"`",...
[ 1, 1, 1, 0, 1, 0, 0, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [81, 21, 12, 24, 20, 11, 54, 118, 545, 229, 127, 131, 108, 203], "buggy_code_start_loc": [49, 11, 11, 23, 19, 10, 53, 87, 27, 58, 24, 79, 26, 32], "filenames": ["api/memo.go", "api/memo_organizer.go", "api/memo_resource.go", "api/resource.go", "api/shortcut.go", "api/tag.go", "api/user_setting.go...
305
Determine whether the {function_name} code is vulnerable or not.
[ "package api", "type MemoOrganizer struct {\n\tID int", "\t// Domain specific fields\n\tMemoID int\n\tUserID int\n\tPinned bool\n}\n", "type MemoOrganizerUpsert struct {\n\tMemoID int `json:\"-\"`\n\tUserID int `json:\"-\"`\n\tPinned bool `json:\"pinned\"`\n}\n", "type MemoOrganizerFind struct {\n\tMemoID...
[ 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [81, 21, 12, 24, 20, 11, 54, 118, 545, 229, 127, 131, 108, 203], "buggy_code_start_loc": [49, 11, 11, 23, 19, 10, 53, 87, 27, 58, 24, 79, 26, 32], "filenames": ["api/memo.go", "api/memo_organizer.go", "api/memo_resource.go", "api/resource.go", "api/shortcut.go", "api/tag.go", "api/user_setting.go...
305
Determine whether the {function_name} code is vulnerable or not.
[ "package api", "type MemoResource struct {\n\tMemoID int\n\tResourceID int\n\tCreatedTs int64\n\tUpdatedTs int64\n}", "type MemoResourceUpsert struct {", "\tMemoID int", "\tResourceID int\n\tUpdatedTs *int64\n}", "type MemoResourceFind struct {\n\tMemoID *int\n\tResourceID *int\n}", "type...
[ 1, 1, 1, 0, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [81, 21, 12, 24, 20, 11, 54, 118, 545, 229, 127, 131, 108, 203], "buggy_code_start_loc": [49, 11, 11, 23, 19, 10, 53, 87, 27, 58, 24, 79, 26, 32], "filenames": ["api/memo.go", "api/memo_organizer.go", "api/memo_resource.go", "api/resource.go", "api/shortcut.go", "api/tag.go", "api/user_setting.go...
305
Determine whether the {function_name} code is vulnerable or not.
[ "package api", "type MemoResource struct {\n\tMemoID int\n\tResourceID int\n\tCreatedTs int64\n\tUpdatedTs int64\n}", "type MemoResourceUpsert struct {", "\tMemoID int `json:\"-\"`", "\tResourceID int\n\tUpdatedTs *int64\n}", "type MemoResourceFind struct {\n\tMemoID *int\n\tResourceID *int...
[ 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [81, 21, 12, 24, 20, 11, 54, 118, 545, 229, 127, 131, 108, 203], "buggy_code_start_loc": [49, 11, 11, 23, 19, 10, 53, 87, 27, 58, 24, 79, 26, 32], "filenames": ["api/memo.go", "api/memo_organizer.go", "api/memo_resource.go", "api/resource.go", "api/shortcut.go", "api/tag.go", "api/user_setting.go...
305
Determine whether the {function_name} code is vulnerable or not.
[ "package api", "type Resource struct {\n\tID int `json:\"id\"`", "\t// Standard fields\n\tCreatorID int `json:\"creatorId\"`\n\tCreatedTs int64 `json:\"createdTs\"`\n\tUpdatedTs int64 `json:\"updatedTs\"`", "\t// Domain specific fields\n\tFilename string `json:\"filename\"`\n\tBlob []byte `json:\"-\"`\n...
[ 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [81, 21, 12, 24, 20, 11, 54, 118, 545, 229, 127, 131, 108, 203], "buggy_code_start_loc": [49, 11, 11, 23, 19, 10, 53, 87, 27, 58, 24, 79, 26, 32], "filenames": ["api/memo.go", "api/memo_organizer.go", "api/memo_resource.go", "api/resource.go", "api/shortcut.go", "api/tag.go", "api/user_setting.go...
305
Determine whether the {function_name} code is vulnerable or not.
[ "package api", "type Resource struct {\n\tID int `json:\"id\"`", "\t// Standard fields\n\tCreatorID int `json:\"creatorId\"`\n\tCreatedTs int64 `json:\"createdTs\"`\n\tUpdatedTs int64 `json:\"updatedTs\"`", "\t// Domain specific fields\n\tFilename string `json:\"filename\"`\n\tBlob []byte `json:\"-\"`\n...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [81, 21, 12, 24, 20, 11, 54, 118, 545, 229, 127, 131, 108, 203], "buggy_code_start_loc": [49, 11, 11, 23, 19, 10, 53, 87, 27, 58, 24, 79, 26, 32], "filenames": ["api/memo.go", "api/memo_organizer.go", "api/memo_resource.go", "api/resource.go", "api/shortcut.go", "api/tag.go", "api/user_setting.go...
305