prompt stringclasses 1
value | completions listlengths 1 63.8k | labels listlengths 1 63.8k | source stringclasses 1
value | other_info stringlengths 2.06k 101k | index int64 0 6.83k |
|---|---|---|---|---|---|
Determine whether the {function_name} code is vulnerable or not. | [
"package api",
"type Shortcut struct {\n\tID int `json:\"id\"`",
"\t// Standard fields\n\tRowStatus RowStatus `json:\"rowStatus\"`\n\tCreatorID int `json:\"creatorId\"`\n\tCreatedTs int64 `json:\"createdTs\"`\n\tUpdatedTs int64 `json:\"updatedTs\"`",
"\t// Domain specific fields\n\tTitle strin... | [
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [81, 21, 12, 24, 20, 11, 54, 118, 545, 229, 127, 131, 108, 203], "buggy_code_start_loc": [49, 11, 11, 23, 19, 10, 53, 87, 27, 58, 24, 79, 26, 32], "filenames": ["api/memo.go", "api/memo_organizer.go", "api/memo_resource.go", "api/resource.go", "api/shortcut.go", "api/tag.go", "api/user_setting.go... | 305 |
Determine whether the {function_name} code is vulnerable or not. | [
"package api",
"type Shortcut struct {\n\tID int `json:\"id\"`",
"\t// Standard fields\n\tRowStatus RowStatus `json:\"rowStatus\"`\n\tCreatorID int `json:\"creatorId\"`\n\tCreatedTs int64 `json:\"createdTs\"`\n\tUpdatedTs int64 `json:\"updatedTs\"`",
"\t// Domain specific fields\n\tTitle strin... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [81, 21, 12, 24, 20, 11, 54, 118, 545, 229, 127, 131, 108, 203], "buggy_code_start_loc": [49, 11, 11, 23, 19, 10, 53, 87, 27, 58, 24, 79, 26, 32], "filenames": ["api/memo.go", "api/memo_organizer.go", "api/memo_resource.go", "api/resource.go", "api/shortcut.go", "api/tag.go", "api/user_setting.go... | 305 |
Determine whether the {function_name} code is vulnerable or not. | [
"package api",
"type Tag struct {\n\tName string\n\tCreatorID int\n}",
"type TagUpsert struct {\n\tName string",
"\tCreatorID int",
"}",
"type TagFind struct {\n\tCreatorID int\n}",
"type TagDelete struct {\n\tName string\n\tCreatorID int\n}"
] | [
1,
1,
1,
0,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [81, 21, 12, 24, 20, 11, 54, 118, 545, 229, 127, 131, 108, 203], "buggy_code_start_loc": [49, 11, 11, 23, 19, 10, 53, 87, 27, 58, 24, 79, 26, 32], "filenames": ["api/memo.go", "api/memo_organizer.go", "api/memo_resource.go", "api/resource.go", "api/shortcut.go", "api/tag.go", "api/user_setting.go... | 305 |
Determine whether the {function_name} code is vulnerable or not. | [
"package api",
"type Tag struct {\n\tName string\n\tCreatorID int\n}",
"type TagUpsert struct {\n\tName string",
"\tCreatorID int `json:\"-\"`",
"}",
"type TagFind struct {\n\tCreatorID int\n}",
"type TagDelete struct {\n\tName string\n\tCreatorID int\n}"
] | [
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [81, 21, 12, 24, 20, 11, 54, 118, 545, 229, 127, 131, 108, 203], "buggy_code_start_loc": [49, 11, 11, 23, 19, 10, 53, 87, 27, 58, 24, 79, 26, 32], "filenames": ["api/memo.go", "api/memo_organizer.go", "api/memo_resource.go", "api/resource.go", "api/shortcut.go", "api/tag.go", "api/user_setting.go... | 305 |
Determine whether the {function_name} code is vulnerable or not. | [
"package api",
"import (\n\t\"encoding/json\"\n\t\"fmt\"",
"\t\"golang.org/x/exp/slices\"\n)",
"type UserSettingKey string",
"const (\n\t// UserSettingLocaleKey is the key type for user locale.\n\tUserSettingLocaleKey UserSettingKey = \"locale\"\n\t// UserSettingAppearanceKey is the key type for user appear... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [81, 21, 12, 24, 20, 11, 54, 118, 545, 229, 127, 131, 108, 203], "buggy_code_start_loc": [49, 11, 11, 23, 19, 10, 53, 87, 27, 58, 24, 79, 26, 32], "filenames": ["api/memo.go", "api/memo_organizer.go", "api/memo_resource.go", "api/resource.go", "api/shortcut.go", "api/tag.go", "api/user_setting.go... | 305 |
Determine whether the {function_name} code is vulnerable or not. | [
"package api",
"import (\n\t\"encoding/json\"\n\t\"fmt\"",
"\t\"golang.org/x/exp/slices\"\n)",
"type UserSettingKey string",
"const (\n\t// UserSettingLocaleKey is the key type for user locale.\n\tUserSettingLocaleKey UserSettingKey = \"locale\"\n\t// UserSettingAppearanceKey is the key type for user appear... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [81, 21, 12, 24, 20, 11, 54, 118, 545, 229, 127, 131, 108, 203], "buggy_code_start_loc": [49, 11, 11, 23, 19, 10, 53, 87, 27, 58, 24, 79, 26, 32], "filenames": ["api/memo.go", "api/memo_organizer.go", "api/memo_resource.go", "api/resource.go", "api/shortcut.go", "api/tag.go", "api/user_setting.go... | 305 |
Determine whether the {function_name} code is vulnerable or not. | [
"package server",
"import (\n\t\"encoding/json\"\n\t\"fmt\"\n\t\"net/http\"",
"\t\"github.com/usememos/memos/api\"\n\t\"github.com/usememos/memos/common\"\n\tmetric \"github.com/usememos/memos/plugin/metrics\"",
"\t\"github.com/labstack/echo/v4\"\n\t\"golang.org/x/crypto/bcrypt\"\n)",
"func (s *Server) regi... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
0,
1,
1,
0,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [81, 21, 12, 24, 20, 11, 54, 118, 545, 229, 127, 131, 108, 203], "buggy_code_start_loc": [49, 11, 11, 23, 19, 10, 53, 87, 27, 58, 24, 79, 26, 32], "filenames": ["api/memo.go", "api/memo_organizer.go", "api/memo_resource.go", "api/resource.go", "api/shortcut.go", "api/tag.go", "api/user_setting.go... | 305 |
Determine whether the {function_name} code is vulnerable or not. | [
"package server",
"import (\n\t\"encoding/json\"\n\t\"fmt\"\n\t\"net/http\"",
"\t\"github.com/usememos/memos/api\"\n\t\"github.com/usememos/memos/common\"\n\tmetric \"github.com/usememos/memos/plugin/metrics\"",
"\t\"github.com/labstack/echo/v4\"\n\t\"golang.org/x/crypto/bcrypt\"\n)",
"func (s *Server) regi... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [81, 21, 12, 24, 20, 11, 54, 118, 545, 229, 127, 131, 108, 203], "buggy_code_start_loc": [49, 11, 11, 23, 19, 10, 53, 87, 27, 58, 24, 79, 26, 32], "filenames": ["api/memo.go", "api/memo_organizer.go", "api/memo_resource.go", "api/resource.go", "api/shortcut.go", "api/tag.go", "api/user_setting.go... | 305 |
Determine whether the {function_name} code is vulnerable or not. | [
"package server",
"import (\n\t\"encoding/json\"\n\t\"fmt\"\n\t\"net/http\"\n\t\"sort\"\n\t\"strconv\"\n\t\"strings\"\n\t\"time\"",
"\t\"github.com/usememos/memos/api\"\n\t\"github.com/usememos/memos/common\"\n\tmetric \"github.com/usememos/memos/plugin/metrics\"",
"\t\"github.com/labstack/echo/v4\"\n)",
"f... | [
1,
1,
1,
1,
1,
0,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
0,
0,
0,
0,
0... | PreciseBugs | {"buggy_code_end_loc": [81, 21, 12, 24, 20, 11, 54, 118, 545, 229, 127, 131, 108, 203], "buggy_code_start_loc": [49, 11, 11, 23, 19, 10, 53, 87, 27, 58, 24, 79, 26, 32], "filenames": ["api/memo.go", "api/memo_organizer.go", "api/memo_resource.go", "api/resource.go", "api/shortcut.go", "api/tag.go", "api/user_setting.go... | 305 |
Determine whether the {function_name} code is vulnerable or not. | [
"package server",
"import (\n\t\"encoding/json\"\n\t\"fmt\"\n\t\"net/http\"\n\t\"sort\"\n\t\"strconv\"\n\t\"strings\"\n\t\"time\"",
"\t\"github.com/usememos/memos/api\"\n\t\"github.com/usememos/memos/common\"\n\tmetric \"github.com/usememos/memos/plugin/metrics\"",
"\t\"github.com/labstack/echo/v4\"\n)",
"f... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [81, 21, 12, 24, 20, 11, 54, 118, 545, 229, 127, 131, 108, 203], "buggy_code_start_loc": [49, 11, 11, 23, 19, 10, 53, 87, 27, 58, 24, 79, 26, 32], "filenames": ["api/memo.go", "api/memo_organizer.go", "api/memo_resource.go", "api/resource.go", "api/shortcut.go", "api/tag.go", "api/user_setting.go... | 305 |
Determine whether the {function_name} code is vulnerable or not. | [
"package server",
"import (\n\t\"encoding/json\"\n\t\"fmt\"\n\t\"io\"\n\t\"net/http\"\n\t\"net/url\"\n\t\"strconv\"\n\t\"time\"",
"\t\"github.com/usememos/memos/api\"\n\t\"github.com/usememos/memos/common\"\n\tmetric \"github.com/usememos/memos/plugin/metrics\"",
"\t\"github.com/labstack/echo/v4\"\n)",
"con... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
0,
1,
0,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [81, 21, 12, 24, 20, 11, 54, 118, 545, 229, 127, 131, 108, 203], "buggy_code_start_loc": [49, 11, 11, 23, 19, 10, 53, 87, 27, 58, 24, 79, 26, 32], "filenames": ["api/memo.go", "api/memo_organizer.go", "api/memo_resource.go", "api/resource.go", "api/shortcut.go", "api/tag.go", "api/user_setting.go... | 305 |
Determine whether the {function_name} code is vulnerable or not. | [
"package server",
"import (\n\t\"encoding/json\"\n\t\"fmt\"\n\t\"io\"\n\t\"net/http\"\n\t\"net/url\"\n\t\"strconv\"\n\t\"time\"",
"\t\"github.com/usememos/memos/api\"\n\t\"github.com/usememos/memos/common\"\n\tmetric \"github.com/usememos/memos/plugin/metrics\"",
"\t\"github.com/labstack/echo/v4\"\n)",
"con... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [81, 21, 12, 24, 20, 11, 54, 118, 545, 229, 127, 131, 108, 203], "buggy_code_start_loc": [49, 11, 11, 23, 19, 10, 53, 87, 27, 58, 24, 79, 26, 32], "filenames": ["api/memo.go", "api/memo_organizer.go", "api/memo_resource.go", "api/resource.go", "api/shortcut.go", "api/tag.go", "api/user_setting.go... | 305 |
Determine whether the {function_name} code is vulnerable or not. | [
"package server",
"import (\n\t\"encoding/json\"\n\t\"fmt\"\n\t\"net/http\"\n\t\"strconv\"\n\t\"time\"",
"\t\"github.com/usememos/memos/api\"\n\t\"github.com/usememos/memos/common\"\n\tmetric \"github.com/usememos/memos/plugin/metrics\"",
"\t\"github.com/labstack/echo/v4\"\n)",
"func (s *Server) registerSho... | [
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1,
0,
1,
0,
1,
0,
1,
0,
1,
1,
1,
0,
0,
0,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [81, 21, 12, 24, 20, 11, 54, 118, 545, 229, 127, 131, 108, 203], "buggy_code_start_loc": [49, 11, 11, 23, 19, 10, 53, 87, 27, 58, 24, 79, 26, 32], "filenames": ["api/memo.go", "api/memo_organizer.go", "api/memo_resource.go", "api/resource.go", "api/shortcut.go", "api/tag.go", "api/user_setting.go... | 305 |
Determine whether the {function_name} code is vulnerable or not. | [
"package server",
"import (\n\t\"encoding/json\"\n\t\"fmt\"\n\t\"net/http\"\n\t\"strconv\"\n\t\"time\"",
"\t\"github.com/usememos/memos/api\"\n\t\"github.com/usememos/memos/common\"\n\tmetric \"github.com/usememos/memos/plugin/metrics\"",
"\t\"github.com/labstack/echo/v4\"\n)",
"func (s *Server) registerSho... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [81, 21, 12, 24, 20, 11, 54, 118, 545, 229, 127, 131, 108, 203], "buggy_code_start_loc": [49, 11, 11, 23, 19, 10, 53, 87, 27, 58, 24, 79, 26, 32], "filenames": ["api/memo.go", "api/memo_organizer.go", "api/memo_resource.go", "api/resource.go", "api/shortcut.go", "api/tag.go", "api/user_setting.go... | 305 |
Determine whether the {function_name} code is vulnerable or not. | [
"package server",
"import (\n\t\"encoding/json\"\n\t\"net/http\"\n\t\"os\"",
"\t\"github.com/usememos/memos/api\"\n\t\"github.com/usememos/memos/common\"\n\tmetric \"github.com/usememos/memos/plugin/metrics\"",
"\t\"github.com/labstack/echo/v4\"\n)",
"func (s *Server) registerSystemRoutes(g *echo.Group) {\n... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [81, 21, 12, 24, 20, 11, 54, 118, 545, 229, 127, 131, 108, 203], "buggy_code_start_loc": [49, 11, 11, 23, 19, 10, 53, 87, 27, 58, 24, 79, 26, 32], "filenames": ["api/memo.go", "api/memo_organizer.go", "api/memo_resource.go", "api/resource.go", "api/shortcut.go", "api/tag.go", "api/user_setting.go... | 305 |
Determine whether the {function_name} code is vulnerable or not. | [
"package server",
"import (\n\t\"encoding/json\"\n\t\"net/http\"\n\t\"os\"",
"\t\"github.com/usememos/memos/api\"\n\t\"github.com/usememos/memos/common\"\n\tmetric \"github.com/usememos/memos/plugin/metrics\"",
"\t\"github.com/labstack/echo/v4\"\n)",
"func (s *Server) registerSystemRoutes(g *echo.Group) {\n... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [81, 21, 12, 24, 20, 11, 54, 118, 545, 229, 127, 131, 108, 203], "buggy_code_start_loc": [49, 11, 11, 23, 19, 10, 53, 87, 27, 58, 24, 79, 26, 32], "filenames": ["api/memo.go", "api/memo_organizer.go", "api/memo_resource.go", "api/resource.go", "api/shortcut.go", "api/tag.go", "api/user_setting.go... | 305 |
Determine whether the {function_name} code is vulnerable or not. | [
"package server",
"import (\n\t\"encoding/json\"\n\t\"fmt\"\n\t\"net/http\"\n\t\"regexp\"\n\t\"sort\"\n\t\"strconv\"",
"\t\"github.com/usememos/memos/api\"\n\t\"github.com/usememos/memos/common\"\n\tmetric \"github.com/usememos/memos/plugin/metrics\"",
"\t\"github.com/labstack/echo/v4\"\n)",
"func (s *Serve... | [
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
0,
0,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [81, 21, 12, 24, 20, 11, 54, 118, 545, 229, 127, 131, 108, 203], "buggy_code_start_loc": [49, 11, 11, 23, 19, 10, 53, 87, 27, 58, 24, 79, 26, 32], "filenames": ["api/memo.go", "api/memo_organizer.go", "api/memo_resource.go", "api/resource.go", "api/shortcut.go", "api/tag.go", "api/user_setting.go... | 305 |
Determine whether the {function_name} code is vulnerable or not. | [
"package server",
"import (\n\t\"encoding/json\"\n\t\"fmt\"\n\t\"net/http\"\n\t\"regexp\"\n\t\"sort\"\n\t\"strconv\"",
"\t\"github.com/usememos/memos/api\"\n\t\"github.com/usememos/memos/common\"\n\tmetric \"github.com/usememos/memos/plugin/metrics\"",
"\t\"github.com/labstack/echo/v4\"\n)",
"func (s *Serve... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [81, 21, 12, 24, 20, 11, 54, 118, 545, 229, 127, 131, 108, 203], "buggy_code_start_loc": [49, 11, 11, 23, 19, 10, 53, 87, 27, 58, 24, 79, 26, 32], "filenames": ["api/memo.go", "api/memo_organizer.go", "api/memo_resource.go", "api/resource.go", "api/shortcut.go", "api/tag.go", "api/user_setting.go... | 305 |
Determine whether the {function_name} code is vulnerable or not. | [
"package server",
"import (\n\t\"encoding/json\"\n\t\"fmt\"\n\t\"net/http\"\n\t\"strconv\"\n\t\"time\"",
"\t\"github.com/usememos/memos/api\"\n\t\"github.com/usememos/memos/common\"\n\tmetric \"github.com/usememos/memos/plugin/metrics\"",
"\t\"github.com/labstack/echo/v4\"\n\t\"golang.org/x/crypto/bcrypt\"\n)... | [
1,
1,
1,
1,
1,
0,
0,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
0,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [81, 21, 12, 24, 20, 11, 54, 118, 545, 229, 127, 131, 108, 203], "buggy_code_start_loc": [49, 11, 11, 23, 19, 10, 53, 87, 27, 58, 24, 79, 26, 32], "filenames": ["api/memo.go", "api/memo_organizer.go", "api/memo_resource.go", "api/resource.go", "api/shortcut.go", "api/tag.go", "api/user_setting.go... | 305 |
Determine whether the {function_name} code is vulnerable or not. | [
"package server",
"import (\n\t\"encoding/json\"\n\t\"fmt\"\n\t\"net/http\"\n\t\"strconv\"\n\t\"time\"",
"\t\"github.com/usememos/memos/api\"\n\t\"github.com/usememos/memos/common\"\n\tmetric \"github.com/usememos/memos/plugin/metrics\"",
"\t\"github.com/labstack/echo/v4\"\n\t\"golang.org/x/crypto/bcrypt\"\n)... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [81, 21, 12, 24, 20, 11, 54, 118, 545, 229, 127, 131, 108, 203], "buggy_code_start_loc": [49, 11, 11, 23, 19, 10, 53, 87, 27, 58, 24, 79, 26, 32], "filenames": ["api/memo.go", "api/memo_organizer.go", "api/memo_resource.go", "api/resource.go", "api/shortcut.go", "api/tag.go", "api/user_setting.go... | 305 |
Determine whether the {function_name} code is vulnerable or not. | [
"import asyncio\nfrom typing import Dict, Optional, Tuple",
"from mitmproxy import command, ctx, exceptions, flow, http, log, master, options, platform, tcp, websocket\nfrom mitmproxy.flow import Flow\nfrom mitmproxy.proxy import commands, events, server_hooks\nfrom mitmproxy.proxy import server\nfrom mitmproxy.p... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [98, 18, 108, 332, 60, 99, 1263, 359], "buggy_code_start_loc": [98, 5, 38, 236, 43, 7, 1263, 355], "filenames": ["mitmproxy/addons/proxyserver.py", "mitmproxy/net/http/http1/__init__.py", "mitmproxy/net/http/http1/read.py", "mitmproxy/proxy/layers/http/_http1.py", "mitmproxy/proxy/layers/http/_ht... | 306 |
Determine whether the {function_name} code is vulnerable or not. | [
"import asyncio\nfrom typing import Dict, Optional, Tuple",
"from mitmproxy import command, ctx, exceptions, flow, http, log, master, options, platform, tcp, websocket\nfrom mitmproxy.flow import Flow\nfrom mitmproxy.proxy import commands, events, server_hooks\nfrom mitmproxy.proxy import server\nfrom mitmproxy.p... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [98, 18, 108, 332, 60, 99, 1263, 359], "buggy_code_start_loc": [98, 5, 38, 236, 43, 7, 1263, 355], "filenames": ["mitmproxy/addons/proxyserver.py", "mitmproxy/net/http/http1/__init__.py", "mitmproxy/net/http/http1/read.py", "mitmproxy/proxy/layers/http/_http1.py", "mitmproxy/proxy/layers/http/_ht... | 306 |
Determine whether the {function_name} code is vulnerable or not. | [
"from .read import (\n read_request_head,\n read_response_head,\n connection_close,\n expected_http_body_size,",
"",
")\nfrom .assemble import (\n assemble_request, assemble_request_head,\n assemble_response, assemble_response_head,\n assemble_body,\n)",
"\n__all__ = [\n \"read_request... | [
1,
0,
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [98, 18, 108, 332, 60, 99, 1263, 359], "buggy_code_start_loc": [98, 5, 38, 236, 43, 7, 1263, 355], "filenames": ["mitmproxy/addons/proxyserver.py", "mitmproxy/net/http/http1/__init__.py", "mitmproxy/net/http/http1/read.py", "mitmproxy/proxy/layers/http/_http1.py", "mitmproxy/proxy/layers/http/_ht... | 306 |
Determine whether the {function_name} code is vulnerable or not. | [
"from .read import (\n read_request_head,\n read_response_head,\n connection_close,\n expected_http_body_size,",
" validate_headers,",
")\nfrom .assemble import (\n assemble_request, assemble_request_head,\n assemble_response, assemble_response_head,\n assemble_body,\n)",
"\n__all__ = ... | [
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [98, 18, 108, 332, 60, 99, 1263, 359], "buggy_code_start_loc": [98, 5, 38, 236, 43, 7, 1263, 355], "filenames": ["mitmproxy/addons/proxyserver.py", "mitmproxy/net/http/http1/__init__.py", "mitmproxy/net/http/http1/read.py", "mitmproxy/proxy/layers/http/_http1.py", "mitmproxy/proxy/layers/http/_ht... | 306 |
Determine whether the {function_name} code is vulnerable or not. | [
"import re\nimport time\nfrom typing import List, Tuple, Iterable, Optional",
"from mitmproxy.http import Request, Headers, Response\nfrom mitmproxy.net.http import url",
"\ndef get_header_tokens(headers, key):\n \"\"\"\n Retrieve all tokens for a header key. A number of different headers\n fol... | [
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [98, 18, 108, 332, 60, 99, 1263, 359], "buggy_code_start_loc": [98, 5, 38, 236, 43, 7, 1263, 355], "filenames": ["mitmproxy/addons/proxyserver.py", "mitmproxy/net/http/http1/__init__.py", "mitmproxy/net/http/http1/read.py", "mitmproxy/proxy/layers/http/_http1.py", "mitmproxy/proxy/layers/http/_ht... | 306 |
Determine whether the {function_name} code is vulnerable or not. | [
"import re\nimport time\nfrom typing import List, Tuple, Iterable, Optional",
"from mitmproxy.http import Request, Headers, Response\nfrom mitmproxy.net.http import url",
"\ndef get_header_tokens(headers, key):\n \"\"\"\n Retrieve all tokens for a header key. A number of different headers\n fol... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [98, 18, 108, 332, 60, 99, 1263, 359], "buggy_code_start_loc": [98, 5, 38, 236, 43, 7, 1263, 355], "filenames": ["mitmproxy/addons/proxyserver.py", "mitmproxy/net/http/http1/__init__.py", "mitmproxy/net/http/http1/read.py", "mitmproxy/proxy/layers/http/_http1.py", "mitmproxy/proxy/layers/http/_ht... | 306 |
Determine whether the {function_name} code is vulnerable or not. | [
"import abc\nfrom typing import Callable, Optional, Type, Union",
"import h11\nfrom h11._readers import ChunkedReader, ContentLengthReader, Http10Reader\nfrom h11._receivebuffer import ReceiveBuffer",
"from mitmproxy import http, version\nfrom mitmproxy.connection import Connection, ConnectionState\nfrom mitmpr... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [98, 18, 108, 332, 60, 99, 1263, 359], "buggy_code_start_loc": [98, 5, 38, 236, 43, 7, 1263, 355], "filenames": ["mitmproxy/addons/proxyserver.py", "mitmproxy/net/http/http1/__init__.py", "mitmproxy/net/http/http1/read.py", "mitmproxy/proxy/layers/http/_http1.py", "mitmproxy/proxy/layers/http/_ht... | 306 |
Determine whether the {function_name} code is vulnerable or not. | [
"import abc\nfrom typing import Callable, Optional, Type, Union",
"import h11\nfrom h11._readers import ChunkedReader, ContentLengthReader, Http10Reader\nfrom h11._receivebuffer import ReceiveBuffer",
"from mitmproxy import http, version\nfrom mitmproxy.connection import Connection, ConnectionState\nfrom mitmpr... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [98, 18, 108, 332, 60, 99, 1263, 359], "buggy_code_start_loc": [98, 5, 38, 236, 43, 7, 1263, 355], "filenames": ["mitmproxy/addons/proxyserver.py", "mitmproxy/net/http/http1/__init__.py", "mitmproxy/net/http/http1/read.py", "mitmproxy/proxy/layers/http/_http1.py", "mitmproxy/proxy/layers/http/_ht... | 306 |
Determine whether the {function_name} code is vulnerable or not. | [
"import collections\nimport time\nfrom enum import Enum\nfrom typing import ClassVar, DefaultDict, Dict, List, Optional, Sequence, Tuple, Type, Union",
"import h2.config\nimport h2.connection\nimport h2.errors\nimport h2.events\nimport h2.exceptions\nimport h2.settings\nimport h2.stream\nimport h2.utilities",
"... | [
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [98, 18, 108, 332, 60, 99, 1263, 359], "buggy_code_start_loc": [98, 5, 38, 236, 43, 7, 1263, 355], "filenames": ["mitmproxy/addons/proxyserver.py", "mitmproxy/net/http/http1/__init__.py", "mitmproxy/net/http/http1/read.py", "mitmproxy/proxy/layers/http/_http1.py", "mitmproxy/proxy/layers/http/_ht... | 306 |
Determine whether the {function_name} code is vulnerable or not. | [
"import collections\nimport time\nfrom enum import Enum\nfrom typing import ClassVar, DefaultDict, Dict, List, Optional, Sequence, Tuple, Type, Union",
"import h2.config\nimport h2.connection\nimport h2.errors\nimport h2.events\nimport h2.exceptions\nimport h2.settings\nimport h2.stream\nimport h2.utilities",
"... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [98, 18, 108, 332, 60, 99, 1263, 359], "buggy_code_start_loc": [98, 5, 38, 236, 43, 7, 1263, 355], "filenames": ["mitmproxy/addons/proxyserver.py", "mitmproxy/net/http/http1/__init__.py", "mitmproxy/net/http/http1/read.py", "mitmproxy/proxy/layers/http/_http1.py", "mitmproxy/proxy/layers/http/_ht... | 306 |
Determine whether the {function_name} code is vulnerable or not. | [
"import pytest",
"from mitmproxy.http import Headers\nfrom mitmproxy.net.http.http1.read import (\n read_request_head,\n read_response_head, connection_close, expected_http_body_size,",
" _read_request_line, _read_response_line, _read_headers, get_header_tokens",
")\nfrom mitmproxy.test.tutils import... | [
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [98, 18, 108, 332, 60, 99, 1263, 359], "buggy_code_start_loc": [98, 5, 38, 236, 43, 7, 1263, 355], "filenames": ["mitmproxy/addons/proxyserver.py", "mitmproxy/net/http/http1/__init__.py", "mitmproxy/net/http/http1/read.py", "mitmproxy/proxy/layers/http/_http1.py", "mitmproxy/proxy/layers/http/_ht... | 306 |
Determine whether the {function_name} code is vulnerable or not. | [
"import pytest",
"from mitmproxy.http import Headers\nfrom mitmproxy.net.http.http1.read import (\n read_request_head,\n read_response_head, connection_close, expected_http_body_size,",
" _read_request_line, _read_response_line, _read_headers, get_header_tokens, validate_headers",
")\nfrom mitmproxy.... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [98, 18, 108, 332, 60, 99, 1263, 359], "buggy_code_start_loc": [98, 5, 38, 236, 43, 7, 1263, 355], "filenames": ["mitmproxy/addons/proxyserver.py", "mitmproxy/net/http/http1/__init__.py", "mitmproxy/net/http/http1/read.py", "mitmproxy/proxy/layers/http/_http1.py", "mitmproxy/proxy/layers/http/_ht... | 306 |
Determine whether the {function_name} code is vulnerable or not. | [
"import pytest",
"from mitmproxy.connection import ConnectionState, Server\nfrom mitmproxy.flow import Error\nfrom mitmproxy.http import HTTPFlow, Response\nfrom mitmproxy.net.server_spec import ServerSpec\nfrom mitmproxy.proxy import layer\nfrom mitmproxy.proxy.commands import CloseConnection, Log, OpenConnectio... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [98, 18, 108, 332, 60, 99, 1263, 359], "buggy_code_start_loc": [98, 5, 38, 236, 43, 7, 1263, 355], "filenames": ["mitmproxy/addons/proxyserver.py", "mitmproxy/net/http/http1/__init__.py", "mitmproxy/net/http/http1/read.py", "mitmproxy/proxy/layers/http/_http1.py", "mitmproxy/proxy/layers/http/_ht... | 306 |
Determine whether the {function_name} code is vulnerable or not. | [
"import pytest",
"from mitmproxy.connection import ConnectionState, Server\nfrom mitmproxy.flow import Error\nfrom mitmproxy.http import HTTPFlow, Response\nfrom mitmproxy.net.server_spec import ServerSpec\nfrom mitmproxy.proxy import layer\nfrom mitmproxy.proxy.commands import CloseConnection, Log, OpenConnectio... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [98, 18, 108, 332, 60, 99, 1263, 359], "buggy_code_start_loc": [98, 5, 38, 236, 43, 7, 1263, 355], "filenames": ["mitmproxy/addons/proxyserver.py", "mitmproxy/net/http/http1/__init__.py", "mitmproxy/net/http/http1/read.py", "mitmproxy/proxy/layers/http/_http1.py", "mitmproxy/proxy/layers/http/_ht... | 306 |
Determine whether the {function_name} code is vulnerable or not. | [
"from typing import List, Tuple",
"import h2.settings\nimport hpack\nimport hyperframe.frame\nimport pytest\nfrom h2.errors import ErrorCodes",
"from mitmproxy.connection import ConnectionState, Server\nfrom mitmproxy.flow import Error\nfrom mitmproxy.http import HTTPFlow, Headers, Request\nfrom mitmproxy.net.h... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [98, 18, 108, 332, 60, 99, 1263, 359], "buggy_code_start_loc": [98, 5, 38, 236, 43, 7, 1263, 355], "filenames": ["mitmproxy/addons/proxyserver.py", "mitmproxy/net/http/http1/__init__.py", "mitmproxy/net/http/http1/read.py", "mitmproxy/proxy/layers/http/_http1.py", "mitmproxy/proxy/layers/http/_ht... | 306 |
Determine whether the {function_name} code is vulnerable or not. | [
"from typing import List, Tuple",
"import h2.settings\nimport hpack\nimport hyperframe.frame\nimport pytest\nfrom h2.errors import ErrorCodes",
"from mitmproxy.connection import ConnectionState, Server\nfrom mitmproxy.flow import Error\nfrom mitmproxy.http import HTTPFlow, Headers, Request\nfrom mitmproxy.net.h... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [98, 18, 108, 332, 60, 99, 1263, 359], "buggy_code_start_loc": [98, 5, 38, 236, 43, 7, 1263, 355], "filenames": ["mitmproxy/addons/proxyserver.py", "mitmproxy/net/http/http1/__init__.py", "mitmproxy/net/http/http1/read.py", "mitmproxy/proxy/layers/http/_http1.py", "mitmproxy/proxy/layers/http/_ht... | 306 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%\n% %\n% %\n% M M AAA TTTTT L AAA BBBB ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1354], "buggy_code_start_loc": [1336], "filenames": ["coders/mat.c"], "fixing_code_end_loc": [1355], "fixing_code_start_loc": [1335], "message": "Use-after-free vulnerability in the DestroyImage function in image.c in ImageMagick before 7.0.6-6 allows remote attackers to cause a denial of servic... | 307 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%\n% %\n% %\n% M M AAA TTTTT L AAA BBBB ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1354], "buggy_code_start_loc": [1336], "filenames": ["coders/mat.c"], "fixing_code_end_loc": [1355], "fixing_code_start_loc": [1335], "message": "Use-after-free vulnerability in the DestroyImage function in image.c in ImageMagick before 7.0.6-6 allows remote attackers to cause a denial of servic... | 307 |
Determine whether the {function_name} code is vulnerable or not. | [
"import asyncio\nimport string\nfrom random import choice\nfrom typing import Optional",
"import discord\nfrom redbot.core import Config, commands\nfrom redbot.core.i18n import Translator, cog_i18n",
"_ = Translator(\"Roomer\", __file__)",
"\n@cog_i18n(_)\nclass Roomer(commands.Cog):",
" __version__ = \"... | [
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [325], "buggy_code_start_loc": [15], "filenames": ["roomer/roomer.py"], "fixing_code_end_loc": [321], "fixing_code_start_loc": [15], "message": "Roomer is a discord bot cog (extension) which provides automatic voice channel generation as well as private voice and text channels. A vulnerability ha... | 308 |
Determine whether the {function_name} code is vulnerable or not. | [
"import asyncio\nimport string\nfrom random import choice\nfrom typing import Optional",
"import discord\nfrom redbot.core import Config, commands\nfrom redbot.core.i18n import Translator, cog_i18n",
"_ = Translator(\"Roomer\", __file__)",
"\n@cog_i18n(_)\nclass Roomer(commands.Cog):",
" __version__ = \"... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [325], "buggy_code_start_loc": [15], "filenames": ["roomer/roomer.py"], "fixing_code_end_loc": [321], "fixing_code_start_loc": [15], "message": "Roomer is a discord bot cog (extension) which provides automatic voice channel generation as well as private voice and text channels. A vulnerability ha... | 308 |
Determine whether the {function_name} code is vulnerable or not. | [
"# WP-UserOnline\nContributors: GamerZ \nDonate link: https://lesterchan.net/site/donation/ \nTags: useronline, usersonline, wp-useronline, online, users, user, ajax, widget \nRequires at least: 4.0 \nTested up to: 6.0 ",
"Stable tag: 2.88.0 ",
"License: GPLv2 or later \nLicense URI: http://www.gnu.org/l... | [
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [90, 210, 7], "buggy_code_start_loc": [7, 68, 6], "filenames": ["README.md", "admin.php", "wp-useronline.php"], "fixing_code_end_loc": [94, 220, 7], "fixing_code_start_loc": [7, 68, 6], "message": "The WP-UserOnline plugin for WordPress has multiple Stored Cross-Site Scripting vulnerabilities in ... | 309 |
Determine whether the {function_name} code is vulnerable or not. | [
"# WP-UserOnline\nContributors: GamerZ \nDonate link: https://lesterchan.net/site/donation/ \nTags: useronline, usersonline, wp-useronline, online, users, user, ajax, widget \nRequires at least: 4.0 \nTested up to: 6.0 ",
"Stable tag: 2.88.1 ",
"License: GPLv2 or later \nLicense URI: http://www.gnu.org/l... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [90, 210, 7], "buggy_code_start_loc": [7, 68, 6], "filenames": ["README.md", "admin.php", "wp-useronline.php"], "fixing_code_end_loc": [94, 220, 7], "fixing_code_start_loc": [7, 68, 6], "message": "The WP-UserOnline plugin for WordPress has multiple Stored Cross-Site Scripting vulnerabilities in ... | 309 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"class UserOnline_Admin_Integration extends scbAdminPage {",
"\tfunction setup() {\n\t\t$this->textdomain = 'wp-useronline';",
"\t\t$this->args = array(\n\t\t\t'page_title' => __( 'Users Online Now', $this->textdomain ),\n\t\t\t'menu_title' => __( 'WP-UserOnline', $this->textdomain ),\n\t\t\t'page_sl... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [90, 210, 7], "buggy_code_start_loc": [7, 68, 6], "filenames": ["README.md", "admin.php", "wp-useronline.php"], "fixing_code_end_loc": [94, 220, 7], "fixing_code_start_loc": [7, 68, 6], "message": "The WP-UserOnline plugin for WordPress has multiple Stored Cross-Site Scripting vulnerabilities in ... | 309 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"class UserOnline_Admin_Integration extends scbAdminPage {",
"\tfunction setup() {\n\t\t$this->textdomain = 'wp-useronline';",
"\t\t$this->args = array(\n\t\t\t'page_title' => __( 'Users Online Now', $this->textdomain ),\n\t\t\t'menu_title' => __( 'WP-UserOnline', $this->textdomain ),\n\t\t\t'page_sl... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [90, 210, 7], "buggy_code_start_loc": [7, 68, 6], "filenames": ["README.md", "admin.php", "wp-useronline.php"], "fixing_code_end_loc": [94, 220, 7], "fixing_code_start_loc": [7, 68, 6], "message": "The WP-UserOnline plugin for WordPress has multiple Stored Cross-Site Scripting vulnerabilities in ... | 309 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/*\nPlugin Name: WP-UserOnline\nPlugin URI: https://lesterchan.net/portfolio/programming/php/\nDescription: Enable you to display how many users are online on your Wordpress site",
"Version: 2.88.0",
"Author: Lester 'GaMerZ' Chan\nAuthor URI: https://lesterchan.net\nText Domain: wp-useronline\n*/",
"i... | [
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [90, 210, 7], "buggy_code_start_loc": [7, 68, 6], "filenames": ["README.md", "admin.php", "wp-useronline.php"], "fixing_code_end_loc": [94, 220, 7], "fixing_code_start_loc": [7, 68, 6], "message": "The WP-UserOnline plugin for WordPress has multiple Stored Cross-Site Scripting vulnerabilities in ... | 309 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/*\nPlugin Name: WP-UserOnline\nPlugin URI: https://lesterchan.net/portfolio/programming/php/\nDescription: Enable you to display how many users are online on your Wordpress site",
"Version: 2.88.1",
"Author: Lester 'GaMerZ' Chan\nAuthor URI: https://lesterchan.net\nText Domain: wp-useronline\n*/",
"i... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [90, 210, 7], "buggy_code_start_loc": [7, 68, 6], "filenames": ["README.md", "admin.php", "wp-useronline.php"], "fixing_code_end_loc": [94, 220, 7], "fixing_code_start_loc": [7, 68, 6], "message": "The WP-UserOnline plugin for WordPress has multiple Stored Cross-Site Scripting vulnerabilities in ... | 309 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%\n% %\n% %\n% ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1727], "buggy_code_start_loc": [1331], "filenames": ["coders/psd.c"], "fixing_code_end_loc": [1715], "fixing_code_start_loc": [1331], "message": "In coders/psd.c in ImageMagick 7.0.7-0 Q16, a DoS in ReadPSDLayersInternal() due to lack of an EOF (End of File) check might cause huge CPU consumptio... | 310 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%\n% %\n% %\n% ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1727], "buggy_code_start_loc": [1331], "filenames": ["coders/psd.c"], "fixing_code_end_loc": [1715], "fixing_code_start_loc": [1331], "message": "In coders/psd.c in ImageMagick 7.0.7-0 Q16, a DoS in ReadPSDLayersInternal() due to lack of an EOF (End of File) check might cause huge CPU consumptio... | 310 |
Determine whether the {function_name} code is vulnerable or not. | [
"import logging",
"from contextlib import ExitStack\nfrom dateutil import parser\nfrom functools import wraps\nimport socket\nimport ipaddress\nfrom urllib.parse import urlparse",
"from six import text_type\nfrom sshtunnel import open_tunnel\nfrom redash import settings, utils\nfrom redash.utils import json_loa... | [
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
0,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
0,
1,
0,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [316, 90, 86, 168, 6, 43, 105], "buggy_code_start_loc": [16, 3, 3, 5, 1, 43, 4], "filenames": ["redash/query_runner/__init__.py", "redash/query_runner/csv.py", "redash/query_runner/excel.py", "redash/query_runner/json_ds.py", "redash/utils/requests_session.py", "requirements_all_ds.txt", "tests/q... | 311 |
Determine whether the {function_name} code is vulnerable or not. | [
"import logging",
"from contextlib import ExitStack\nfrom dateutil import parser\nfrom functools import wraps\nimport socket\nimport ipaddress\nfrom urllib.parse import urlparse",
"from six import text_type\nfrom sshtunnel import open_tunnel\nfrom redash import settings, utils\nfrom redash.utils import json_loa... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [316, 90, 86, 168, 6, 43, 105], "buggy_code_start_loc": [16, 3, 3, 5, 1, 43, 4], "filenames": ["redash/query_runner/__init__.py", "redash/query_runner/csv.py", "redash/query_runner/excel.py", "redash/query_runner/json_ds.py", "redash/utils/requests_session.py", "requirements_all_ds.txt", "tests/q... | 311 |
Determine whether the {function_name} code is vulnerable or not. | [
"import logging\nimport yaml",
"import requests",
"import io\n",
"from redash import settings",
"from redash.query_runner import *\nfrom redash.utils import json_dumps",
"logger = logging.getLogger(__name__)",
"try:\n import pandas as pd\n import numpy as np\n enabled = True\nexcept ImportError... | [
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
0,
1,
1,
1,
0,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [316, 90, 86, 168, 6, 43, 105], "buggy_code_start_loc": [16, 3, 3, 5, 1, 43, 4], "filenames": ["redash/query_runner/__init__.py", "redash/query_runner/csv.py", "redash/query_runner/excel.py", "redash/query_runner/json_ds.py", "redash/utils/requests_session.py", "requirements_all_ds.txt", "tests/q... | 311 |
Determine whether the {function_name} code is vulnerable or not. | [
"import logging\nimport yaml",
"",
"import io\n",
"from redash.utils.requests_session import requests_or_advocate, UnacceptableAddressException\n",
"from redash.query_runner import *\nfrom redash.utils import json_dumps",
"logger = logging.getLogger(__name__)",
"try:\n import pandas as pd\n import... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [316, 90, 86, 168, 6, 43, 105], "buggy_code_start_loc": [16, 3, 3, 5, 1, 43, 4], "filenames": ["redash/query_runner/__init__.py", "redash/query_runner/csv.py", "redash/query_runner/excel.py", "redash/query_runner/json_ds.py", "redash/utils/requests_session.py", "requirements_all_ds.txt", "tests/q... | 311 |
Determine whether the {function_name} code is vulnerable or not. | [
"import logging\nimport yaml",
"import requests",
"",
"from redash import settings",
"from redash.query_runner import *\nfrom redash.utils import json_dumps",
"logger = logging.getLogger(__name__)",
"try:\n import pandas as pd\n import xlrd\n import openpyxl\n import numpy as np\n enabled... | [
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
0,
1,
1,
1,
0,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [316, 90, 86, 168, 6, 43, 105], "buggy_code_start_loc": [16, 3, 3, 5, 1, 43, 4], "filenames": ["redash/query_runner/__init__.py", "redash/query_runner/csv.py", "redash/query_runner/excel.py", "redash/query_runner/json_ds.py", "redash/utils/requests_session.py", "requirements_all_ds.txt", "tests/q... | 311 |
Determine whether the {function_name} code is vulnerable or not. | [
"import logging\nimport yaml",
"",
"",
"from redash.utils.requests_session import requests_or_advocate, UnacceptableAddressException\n",
"from redash.query_runner import *\nfrom redash.utils import json_dumps",
"logger = logging.getLogger(__name__)",
"try:\n import pandas as pd\n import xlrd\n ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [316, 90, 86, 168, 6, 43, 105], "buggy_code_start_loc": [16, 3, 3, 5, 1, 43, 4], "filenames": ["redash/query_runner/__init__.py", "redash/query_runner/csv.py", "redash/query_runner/excel.py", "redash/query_runner/json_ds.py", "redash/utils/requests_session.py", "requirements_all_ds.txt", "tests/q... | 311 |
Determine whether the {function_name} code is vulnerable or not. | [
"import logging\nimport yaml\nimport datetime\nfrom funcy import compact, project",
"from redash import settings",
"from redash.utils import json_dumps\nfrom redash.query_runner import (\n BaseHTTPQueryRunner,\n register,\n TYPE_BOOLEAN,\n TYPE_DATETIME,\n TYPE_FLOAT,\n TYPE_INTEGER,\n TYPE... | [
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [316, 90, 86, 168, 6, 43, 105], "buggy_code_start_loc": [16, 3, 3, 5, 1, 43, 4], "filenames": ["redash/query_runner/__init__.py", "redash/query_runner/csv.py", "redash/query_runner/excel.py", "redash/query_runner/json_ds.py", "redash/utils/requests_session.py", "requirements_all_ds.txt", "tests/q... | 311 |
Determine whether the {function_name} code is vulnerable or not. | [
"import logging\nimport yaml\nimport datetime\nfrom funcy import compact, project",
"\nfrom redash.utils.requests_session import requests_or_advocate, UnacceptableAddressException\n",
"from redash.utils import json_dumps\nfrom redash.query_runner import (\n BaseHTTPQueryRunner,\n register,\n TYPE_BOOLE... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [316, 90, 86, 168, 6, 43, 105], "buggy_code_start_loc": [16, 3, 3, 5, 1, 43, 4], "filenames": ["redash/query_runner/__init__.py", "redash/query_runner/csv.py", "redash/query_runner/excel.py", "redash/query_runner/json_ds.py", "redash/utils/requests_session.py", "requirements_all_ds.txt", "tests/q... | 311 |
Determine whether the {function_name} code is vulnerable or not. | [
"import requests",
"from redash import settings\n",
"",
"",
"class ConfiguredSession(requests.Session):",
" def request(self, *args, **kwargs):\n if not settings.REQUESTS_ALLOW_REDIRECTS:\n kwargs.update({\"allow_redirects\": False})\n return super().request(*args, **kwargs)",
... | [
0,
1,
0,
1,
0,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [316, 90, 86, 168, 6, 43, 105], "buggy_code_start_loc": [16, 3, 3, 5, 1, 43, 4], "filenames": ["redash/query_runner/__init__.py", "redash/query_runner/csv.py", "redash/query_runner/excel.py", "redash/query_runner/json_ds.py", "redash/utils/requests_session.py", "requirements_all_ds.txt", "tests/q... | 311 |
Determine whether the {function_name} code is vulnerable or not. | [
"",
"from redash import settings\n",
"from advocate.exceptions import UnacceptableAddressException\nif settings.ENFORCE_PRIVATE_ADDRESS_BLOCK:\n import advocate as requests_or_advocate\nelse:\n import requests as requests_or_advocate",
"",
"",
"class ConfiguredSession(requests_or_advocate.Session):"... | [
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [316, 90, 86, 168, 6, 43, 105], "buggy_code_start_loc": [16, 3, 3, 5, 1, 43, 4], "filenames": ["redash/query_runner/__init__.py", "redash/query_runner/csv.py", "redash/query_runner/excel.py", "redash/query_runner/json_ds.py", "redash/utils/requests_session.py", "requirements_all_ds.txt", "tests/q... | 311 |
Determine whether the {function_name} code is vulnerable or not. | [
"google-api-python-client==1.7.11\nprotobuf==3.17.3\ngspread==3.1.0\nimpyla==0.16.0\ninfluxdb==5.2.3\nmysqlclient==1.3.14\noauth2client==4.1.3\npyhive==0.6.1\npymongo[tls,srv]==3.9.0\nvertica-python==0.9.5\ntd-client==1.0.0\npymssql==2.1.4\ndql==0.5.26\ndynamo3==0.4.10\nboto3>=1.10.0,<1.11.0\nbotocore>=1.13,<1.14.0... | [
1,
0
] | PreciseBugs | {"buggy_code_end_loc": [316, 90, 86, 168, 6, 43, 105], "buggy_code_start_loc": [16, 3, 3, 5, 1, 43, 4], "filenames": ["redash/query_runner/__init__.py", "redash/query_runner/csv.py", "redash/query_runner/excel.py", "redash/query_runner/json_ds.py", "redash/utils/requests_session.py", "requirements_all_ds.txt", "tests/q... | 311 |
Determine whether the {function_name} code is vulnerable or not. | [
"google-api-python-client==1.7.11\nprotobuf==3.17.3\ngspread==3.1.0\nimpyla==0.16.0\ninfluxdb==5.2.3\nmysqlclient==1.3.14\noauth2client==4.1.3\npyhive==0.6.1\npymongo[tls,srv]==3.9.0\nvertica-python==0.9.5\ntd-client==1.0.0\npymssql==2.1.4\ndql==0.5.26\ndynamo3==0.4.10\nboto3>=1.10.0,<1.11.0\nbotocore>=1.13,<1.14.0... | [
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [316, 90, 86, 168, 6, 43, 105], "buggy_code_start_loc": [16, 3, 3, 5, 1, 43, 4], "filenames": ["redash/query_runner/__init__.py", "redash/query_runner/csv.py", "redash/query_runner/excel.py", "redash/query_runner/json_ds.py", "redash/utils/requests_session.py", "requirements_all_ds.txt", "tests/q... | 311 |
Determine whether the {function_name} code is vulnerable or not. | [
"import mock\nfrom unittest import TestCase\n",
"from redash.utils.requests_session import requests, ConfiguredSession",
"from redash.query_runner import BaseHTTPQueryRunner",
"\nclass RequiresAuthQueryRunner(BaseHTTPQueryRunner):\n requires_authentication = True",
"\nclass TestBaseHTTPQueryRunner(TestCa... | [
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
0,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [316, 90, 86, 168, 6, 43, 105], "buggy_code_start_loc": [16, 3, 3, 5, 1, 43, 4], "filenames": ["redash/query_runner/__init__.py", "redash/query_runner/csv.py", "redash/query_runner/excel.py", "redash/query_runner/json_ds.py", "redash/utils/requests_session.py", "requirements_all_ds.txt", "tests/q... | 311 |
Determine whether the {function_name} code is vulnerable or not. | [
"import mock\nfrom unittest import TestCase\n",
"from redash.utils.requests_session import requests_or_advocate, ConfiguredSession",
"from redash.query_runner import BaseHTTPQueryRunner",
"\nclass RequiresAuthQueryRunner(BaseHTTPQueryRunner):\n requires_authentication = True",
"\nclass TestBaseHTTPQueryR... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [316, 90, 86, 168, 6, 43, 105], "buggy_code_start_loc": [16, 3, 3, 5, 1, 43, 4], "filenames": ["redash/query_runner/__init__.py", "redash/query_runner/csv.py", "redash/query_runner/excel.py", "redash/query_runner/json_ds.py", "redash/utils/requests_session.py", "requirements_all_ds.txt", "tests/q... | 311 |
Determine whether the {function_name} code is vulnerable or not. | [
"// Pitchfork ctx defines the context that is passed through Pitchfork pertaining primarily to the logged in, selected user/group\npackage pitchfork",
"import (\n\t\"errors\"\n\t\"fmt\"\n\t\"math\"\n\t\"net\"\n\t\"strconv\"\n\t\"strings\"",
"\tuseragent \"github.com/mssola/user_agent\"\n\ti18n \"github.com/nick... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1336, 1537], "buggy_code_start_loc": [947, 1355], "filenames": ["lib/ctx.go", "lib/struct.go"], "fixing_code_end_loc": [1336, 1538], "fixing_code_start_loc": [947, 1356], "message": "Pitchfork version 1.4.6 RC1 contains an Improper Privilege Management vulnerability in Trident Pitchfork componen... | 312 |
Determine whether the {function_name} code is vulnerable or not. | [
"// Pitchfork ctx defines the context that is passed through Pitchfork pertaining primarily to the logged in, selected user/group\npackage pitchfork",
"import (\n\t\"errors\"\n\t\"fmt\"\n\t\"math\"\n\t\"net\"\n\t\"strconv\"\n\t\"strings\"",
"\tuseragent \"github.com/mssola/user_agent\"\n\ti18n \"github.com/nick... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1336, 1537], "buggy_code_start_loc": [947, 1355], "filenames": ["lib/ctx.go", "lib/struct.go"], "fixing_code_end_loc": [1336, 1538], "fixing_code_start_loc": [947, 1356], "message": "Pitchfork version 1.4.6 RC1 contains an Improper Privilege Management vulnerability in Trident Pitchfork componen... | 312 |
Determine whether the {function_name} code is vulnerable or not. | [
"// Pitchfork struct provides access functions to various ways to inspect or modify contents of structs.\npackage pitchfork",
"import (\n\t\"database/sql\"\n\t\"errors\"\n\t\"reflect\"\n\t\"strconv\"\n\t\"strings\"\n\t\"time\"\n)",
"// PTypeField wraps the relect StructField for ease of use in various Struct re... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1336, 1537], "buggy_code_start_loc": [947, 1355], "filenames": ["lib/ctx.go", "lib/struct.go"], "fixing_code_end_loc": [1336, 1538], "fixing_code_start_loc": [947, 1356], "message": "Pitchfork version 1.4.6 RC1 contains an Improper Privilege Management vulnerability in Trident Pitchfork componen... | 312 |
Determine whether the {function_name} code is vulnerable or not. | [
"// Pitchfork struct provides access functions to various ways to inspect or modify contents of structs.\npackage pitchfork",
"import (\n\t\"database/sql\"\n\t\"errors\"\n\t\"reflect\"\n\t\"strconv\"\n\t\"strings\"\n\t\"time\"\n)",
"// PTypeField wraps the relect StructField for ease of use in various Struct re... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1336, 1537], "buggy_code_start_loc": [947, 1355], "filenames": ["lib/ctx.go", "lib/struct.go"], "fixing_code_end_loc": [1336, 1538], "fixing_code_start_loc": [947, 1356], "message": "Pitchfork version 1.4.6 RC1 contains an Improper Privilege Management vulnerability in Trident Pitchfork componen... | 312 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n *\t\t\tGPAC - Multimedia Framework C SDK\n *\n *\t\t\tAuthors: Jean Le Feuvre\n *\t\t\tCopyright (c) Telecom ParisTech 2000-2012\n *\t\t\t\t\tAll rights reserved\n *\n * This file is part of GPAC / Media Tools sub-project\n *\n * GPAC is free software; you can redistribute it and/or modify\n * it under the... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [798], "buggy_code_start_loc": [796], "filenames": ["src/media_tools/isom_hinter.c"], "fixing_code_end_loc": [802], "fixing_code_start_loc": [796], "message": "An issue was discovered in GPAC version 0.8.0 and 1.0.1. There is heap-based buffer overflow in the function gp_rtp_builder_do_avc() in i... | 313 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n *\t\t\tGPAC - Multimedia Framework C SDK\n *\n *\t\t\tAuthors: Jean Le Feuvre\n *\t\t\tCopyright (c) Telecom ParisTech 2000-2012\n *\t\t\t\t\tAll rights reserved\n *\n * This file is part of GPAC / Media Tools sub-project\n *\n * GPAC is free software; you can redistribute it and/or modify\n * it under the... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [798], "buggy_code_start_loc": [796], "filenames": ["src/media_tools/isom_hinter.c"], "fixing_code_end_loc": [802], "fixing_code_start_loc": [796], "message": "An issue was discovered in GPAC version 0.8.0 and 1.0.1. There is heap-based buffer overflow in the function gp_rtp_builder_do_avc() in i... | 313 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * APEI Error INJection support\n *\n * EINJ provides a hardware error injection mechanism, this is useful\n * for debugging and testing of other APEI and RAS features.\n *\n * For more information about EINJ, please refer to ACPI Specification\n * version 4.0, section 17.5.\n *\n * Copyright 2009-2010 Intel C... | [
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [523], "buggy_code_start_loc": [31], "filenames": ["drivers/acpi/apei/einj.c"], "fixing_code_end_loc": [528], "fixing_code_start_loc": [32], "message": "The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently c... | 314 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * APEI Error INJection support\n *\n * EINJ provides a hardware error injection mechanism, this is useful\n * for debugging and testing of other APEI and RAS features.\n *\n * For more information about EINJ, please refer to ACPI Specification\n * version 4.0, section 17.5.\n *\n * Copyright 2009-2010 Intel C... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [523], "buggy_code_start_loc": [31], "filenames": ["drivers/acpi/apei/einj.c"], "fixing_code_end_loc": [528], "fixing_code_start_loc": [32], "message": "The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently c... | 314 |
Determine whether the {function_name} code is vulnerable or not. | [
"/**\n ** BigBlueButton open source conferencing system - http://www.bigbluebutton.org/\n *\n * Copyright (c) 2012 BigBlueButton Inc. and by respective authors (see below).\n *\n * This program is free software; you can redistribute it and/or modify it under the\n * terms of the GNU Lesser General Public License as... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [247], "buggy_code_start_loc": [247], "filenames": ["bigbluebutton-web/grails-app/controllers/org/bigbluebutton/web/controllers/ApiController.groovy"], "fixing_code_end_loc": [250], "fixing_code_start_loc": [248], "message": "web/controllers/ApiController.groovy in BigBlueButton before 2.2.29 lac... | 315 |
Determine whether the {function_name} code is vulnerable or not. | [
"/**\n ** BigBlueButton open source conferencing system - http://www.bigbluebutton.org/\n *\n * Copyright (c) 2012 BigBlueButton Inc. and by respective authors (see below).\n *\n * This program is free software; you can redistribute it and/or modify it under the\n * terms of the GNU Lesser General Public License as... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [247], "buggy_code_start_loc": [247], "filenames": ["bigbluebutton-web/grails-app/controllers/org/bigbluebutton/web/controllers/ApiController.groovy"], "fixing_code_end_loc": [250], "fixing_code_start_loc": [248], "message": "web/controllers/ApiController.groovy in BigBlueButton before 2.2.29 lac... | 315 |
Determine whether the {function_name} code is vulnerable or not. | [
"# Gerapy",
"\n\n\n[](https://github.com/Gerapy/... | [
1,
1,
0,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [13, 2, 925, 14], "buggy_code_start_loc": [10, 1, 0, 8], "filenames": ["README.md", "gerapy/__version__.py", "gerapy/server/core/views.py", "requirements.txt"], "fixing_code_end_loc": [9, 2, 909, 14], "fixing_code_start_loc": [9, 1, 1, 8], "message": "This affects the package Gerapy from 0 and be... | 316 |
Determine whether the {function_name} code is vulnerable or not. | [
"# Gerapy",
"\n\n\n[](https://github.com/Gerapy/... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [13, 2, 925, 14], "buggy_code_start_loc": [10, 1, 0, 8], "filenames": ["README.md", "gerapy/__version__.py", "gerapy/server/core/views.py", "requirements.txt"], "fixing_code_end_loc": [9, 2, 909, 14], "fixing_code_start_loc": [9, 1, 1, 8], "message": "This affects the package Gerapy from 0 and be... | 316 |
Determine whether the {function_name} code is vulnerable or not. | [
"VERSION = (0, 9, '3a3')",
"\n__version__ = '.'.join(map(str, VERSION))",
"version = lambda: __version__"
] | [
0,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [13, 2, 925, 14], "buggy_code_start_loc": [10, 1, 0, 8], "filenames": ["README.md", "gerapy/__version__.py", "gerapy/server/core/views.py", "requirements.txt"], "fixing_code_end_loc": [9, 2, 909, 14], "fixing_code_start_loc": [9, 1, 1, 8], "message": "This affects the package Gerapy from 0 and be... | 316 |
Determine whether the {function_name} code is vulnerable or not. | [
"VERSION = (0, 9, '3b1')",
"\n__version__ = '.'.join(map(str, VERSION))",
"version = lambda: __version__"
] | [
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [13, 2, 925, 14], "buggy_code_start_loc": [10, 1, 0, 8], "filenames": ["README.md", "gerapy/__version__.py", "gerapy/server/core/views.py", "requirements.txt"], "fixing_code_end_loc": [9, 2, 909, 14], "fixing_code_start_loc": [9, 1, 1, 8], "message": "This affects the package Gerapy from 0 and be... | 316 |
Determine whether the {function_name} code is vulnerable or not. | [
"",
"from pathlib import Path\nfrom urllib.parse import unquote\nimport base64\nimport json, os, requests, time, pytz, pymongo\nfrom shutil import rmtree\nfrom requests.exceptions import ConnectionError\nfrom os.path import join, exists\nfrom django.shortcuts import render\nfrom django.core.serializers import ser... | [
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
0,
1,
1,
0,
1,
1,
0,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
0
] | PreciseBugs | {"buggy_code_end_loc": [13, 2, 925, 14], "buggy_code_start_loc": [10, 1, 0, 8], "filenames": ["README.md", "gerapy/__version__.py", "gerapy/server/core/views.py", "requirements.txt"], "fixing_code_end_loc": [9, 2, 909, 14], "fixing_code_start_loc": [9, 1, 1, 8], "message": "This affects the package Gerapy from 0 and be... | 316 |
Determine whether the {function_name} code is vulnerable or not. | [
"import re",
"from pathlib import Path\nfrom urllib.parse import unquote\nimport base64\nimport json, os, requests, time, pytz, pymongo\nfrom shutil import rmtree\nfrom requests.exceptions import ConnectionError\nfrom os.path import join, exists\nfrom django.shortcuts import render\nfrom django.core.serializers i... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [13, 2, 925, 14], "buggy_code_start_loc": [10, 1, 0, 8], "filenames": ["README.md", "gerapy/__version__.py", "gerapy/server/core/views.py", "requirements.txt"], "fixing_code_end_loc": [9, 2, 909, 14], "fixing_code_start_loc": [9, 1, 1, 8], "message": "This affects the package Gerapy from 0 and be... | 316 |
Determine whether the {function_name} code is vulnerable or not. | [
"apscheduler==3.5.1\ncryptography==2.8\ndjango==1.11.29\ndjango-cors-headers==3.2.0\ndjango-apscheduler==0.3.0\nfurl==2.1.0\njinja2==2.10.1",
"scrapy>=1.4.0",
"scrapy-redis==0.6.8\nscrapy-splash==0.7.2\npython-scrapyd-api==2.1.2\nredis==2.10.5",
"requests>=2.20.0",
"pymongo==3.9.0\npymysql==0.7.10\npyquery=... | [
1,
0,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [13, 2, 925, 14], "buggy_code_start_loc": [10, 1, 0, 8], "filenames": ["README.md", "gerapy/__version__.py", "gerapy/server/core/views.py", "requirements.txt"], "fixing_code_end_loc": [9, 2, 909, 14], "fixing_code_start_loc": [9, 1, 1, 8], "message": "This affects the package Gerapy from 0 and be... | 316 |
Determine whether the {function_name} code is vulnerable or not. | [
"apscheduler==3.5.1\ncryptography==2.8\ndjango==1.11.29\ndjango-cors-headers==3.2.0\ndjango-apscheduler==0.3.0\nfurl==2.1.0\njinja2==2.10.1",
"scrapy==1.5.0",
"scrapy-redis==0.6.8\nscrapy-splash==0.7.2\npython-scrapyd-api==2.1.2\nredis==2.10.5",
"requests==2.20.0",
"pymongo==3.9.0\npymysql==0.7.10\npyquery=... | [
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [13, 2, 925, 14], "buggy_code_start_loc": [10, 1, 0, 8], "filenames": ["README.md", "gerapy/__version__.py", "gerapy/server/core/views.py", "requirements.txt"], "fixing_code_end_loc": [9, 2, 909, 14], "fixing_code_start_loc": [9, 1, 1, 8], "message": "This affects the package Gerapy from 0 and be... | 316 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* vi:set ts=8 sts=4 sw=4 noet:\n *\n * VIM - Vi IMproved\tby Bram Moolenaar\n *\n * Do \":help uganda\" in Vim to read copying and usage conditions.\n * Do \":help credits\" in Vim to see a list of people who contributed.\n * See README.txt for an overview of the Vim source code.\n */",
"/*\n * spell.c: code f... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1491, 804, 736], "buggy_code_start_loc": [1278, 804, 736], "filenames": ["src/spell.c", "src/testdir/test_spell_utf8.vim", "src/version.c"], "fixing_code_end_loc": [1495, 820, 739], "fixing_code_start_loc": [1278, 805, 737], "message": "Use After Free in GitHub repository vim/vim prior to 8.2.",... | 317 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* vi:set ts=8 sts=4 sw=4 noet:\n *\n * VIM - Vi IMproved\tby Bram Moolenaar\n *\n * Do \":help uganda\" in Vim to read copying and usage conditions.\n * Do \":help credits\" in Vim to see a list of people who contributed.\n * See README.txt for an overview of the Vim source code.\n */",
"/*\n * spell.c: code f... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1491, 804, 736], "buggy_code_start_loc": [1278, 804, 736], "filenames": ["src/spell.c", "src/testdir/test_spell_utf8.vim", "src/version.c"], "fixing_code_end_loc": [1495, 820, 739], "fixing_code_start_loc": [1278, 805, 737], "message": "Use After Free in GitHub repository vim/vim prior to 8.2.",... | 317 |
Determine whether the {function_name} code is vulnerable or not. | [
"\" Test for spell checking with 'encoding' set to utf-8",
"source check.vim\nCheckFeature spell",
"scriptencoding utf-8",
"func TearDown()\n set nospell\n call delete('Xtest.aff')\n call delete('Xtest.dic')\n call delete('Xtest.utf-8.add')\n call delete('Xtest.utf-8.add.spl')\n call delete('Xtest.utf-8... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [1491, 804, 736], "buggy_code_start_loc": [1278, 804, 736], "filenames": ["src/spell.c", "src/testdir/test_spell_utf8.vim", "src/version.c"], "fixing_code_end_loc": [1495, 820, 739], "fixing_code_start_loc": [1278, 805, 737], "message": "Use After Free in GitHub repository vim/vim prior to 8.2.",... | 317 |
Determine whether the {function_name} code is vulnerable or not. | [
"\" Test for spell checking with 'encoding' set to utf-8",
"source check.vim\nCheckFeature spell",
"scriptencoding utf-8",
"func TearDown()\n set nospell\n call delete('Xtest.aff')\n call delete('Xtest.dic')\n call delete('Xtest.utf-8.add')\n call delete('Xtest.utf-8.add.spl')\n call delete('Xtest.utf-8... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [1491, 804, 736], "buggy_code_start_loc": [1278, 804, 736], "filenames": ["src/spell.c", "src/testdir/test_spell_utf8.vim", "src/version.c"], "fixing_code_end_loc": [1495, 820, 739], "fixing_code_start_loc": [1278, 805, 737], "message": "Use After Free in GitHub repository vim/vim prior to 8.2.",... | 317 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* vi:set ts=8 sts=4 sw=4 noet:\n *\n * VIM - Vi IMproved\t\tby Bram Moolenaar\n *\n * Do \":help uganda\" in Vim to read copying and usage conditions.\n * Do \":help credits\" in Vim to see a list of people who contributed.\n * See README.txt for an overview of the Vim source code.\n */",
"#include \"vim.h\"",... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [1491, 804, 736], "buggy_code_start_loc": [1278, 804, 736], "filenames": ["src/spell.c", "src/testdir/test_spell_utf8.vim", "src/version.c"], "fixing_code_end_loc": [1495, 820, 739], "fixing_code_start_loc": [1278, 805, 737], "message": "Use After Free in GitHub repository vim/vim prior to 8.2.",... | 317 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* vi:set ts=8 sts=4 sw=4 noet:\n *\n * VIM - Vi IMproved\t\tby Bram Moolenaar\n *\n * Do \":help uganda\" in Vim to read copying and usage conditions.\n * Do \":help credits\" in Vim to see a list of people who contributed.\n * See README.txt for an overview of the Vim source code.\n */",
"#include \"vim.h\"",... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [1491, 804, 736], "buggy_code_start_loc": [1278, 804, 736], "filenames": ["src/spell.c", "src/testdir/test_spell_utf8.vim", "src/version.c"], "fixing_code_end_loc": [1495, 820, 739], "fixing_code_start_loc": [1278, 805, 737], "message": "Use After Free in GitHub repository vim/vim prior to 8.2.",... | 317 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"use LibreNMS\\Util\\Number;",
"$bill_id = $vars['bill_id'];",
"if (Auth::user()->hasGlobalAdmin()) {\n include 'includes/html/pages/bill/actions.inc.php';\n}",
"if (bill_permitted($bill_id)) {\n $bill_data = dbFetchRow('SELECT * FROM bills WHERE bill_id = ?', [$bill_id]);",
" $bill_name... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [91, 107, 146], "buggy_code_start_loc": [90, 5, 97], "filenames": ["includes/html/pages/bill.inc.php", "includes/html/pages/bill/addoreditbill.inc.php", "includes/html/table/bills.inc.php"], "fixing_code_end_loc": [91, 107, 146], "fixing_code_start_loc": [90, 5, 97], "message": "Cross-site Script... | 318 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"use LibreNMS\\Util\\Number;",
"$bill_id = $vars['bill_id'];",
"if (Auth::user()->hasGlobalAdmin()) {\n include 'includes/html/pages/bill/actions.inc.php';\n}",
"if (bill_permitted($bill_id)) {\n $bill_data = dbFetchRow('SELECT * FROM bills WHERE bill_id = ?', [$bill_id]);",
" $bill_name... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [91, 107, 146], "buggy_code_start_loc": [90, 5, 97], "filenames": ["includes/html/pages/bill.inc.php", "includes/html/pages/bill/addoreditbill.inc.php", "includes/html/table/bills.inc.php"], "fixing_code_end_loc": [91, 107, 146], "fixing_code_start_loc": [90, 5, 97], "message": "Cross-site Script... | 318 |
Determine whether the {function_name} code is vulnerable or not. | [
"<h4>Bill Information</h4>\n<div class=\"form-group\">\n <label for=\"bill_name\" class=\"col-sm-4 control-label\">Description</label>\n <div class=\"col-sm-8\">",
" <input class=\"form-control input-sm\" type=\"text\" id=\"bill_name\" name=\"bill_name\" value=\"<?php echo $bill_data['bill_name']; ?>\">",
... | [
1,
0,
1,
0,
1,
0,
1,
0,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [91, 107, 146], "buggy_code_start_loc": [90, 5, 97], "filenames": ["includes/html/pages/bill.inc.php", "includes/html/pages/bill/addoreditbill.inc.php", "includes/html/table/bills.inc.php"], "fixing_code_end_loc": [91, 107, 146], "fixing_code_start_loc": [90, 5, 97], "message": "Cross-site Script... | 318 |
Determine whether the {function_name} code is vulnerable or not. | [
"<h4>Bill Information</h4>\n<div class=\"form-group\">\n <label for=\"bill_name\" class=\"col-sm-4 control-label\">Description</label>\n <div class=\"col-sm-8\">",
" <input class=\"form-control input-sm\" type=\"text\" id=\"bill_name\" name=\"bill_name\" value=\"<?php echo htmlentities($bill_data['bill_name'... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [91, 107, 146], "buggy_code_start_loc": [90, 5, 97], "filenames": ["includes/html/pages/bill.inc.php", "includes/html/pages/bill/addoreditbill.inc.php", "includes/html/table/bills.inc.php"], "fixing_code_end_loc": [91, 107, 146], "fixing_code_start_loc": [90, 5, 97], "message": "Cross-site Script... | 318 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"// Calculate filters\nuse LibreNMS\\Util\\Number;",
"$prev = ! empty($vars['period']) && ($vars['period'] == 'prev');\n$wheres = [];\n$param = [];\nif (isset($searchPhrase) && ! empty($searchPhrase)) {\n $wheres[] = 'bills.bill_name LIKE ?';\n $param[] = \"%$searchPhrase%\";\n}\nif (! empty($var... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [91, 107, 146], "buggy_code_start_loc": [90, 5, 97], "filenames": ["includes/html/pages/bill.inc.php", "includes/html/pages/bill/addoreditbill.inc.php", "includes/html/table/bills.inc.php"], "fixing_code_end_loc": [91, 107, 146], "fixing_code_start_loc": [90, 5, 97], "message": "Cross-site Script... | 318 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"// Calculate filters\nuse LibreNMS\\Util\\Number;",
"$prev = ! empty($vars['period']) && ($vars['period'] == 'prev');\n$wheres = [];\n$param = [];\nif (isset($searchPhrase) && ! empty($searchPhrase)) {\n $wheres[] = 'bills.bill_name LIKE ?';\n $param[] = \"%$searchPhrase%\";\n}\nif (! empty($var... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [91, 107, 146], "buggy_code_start_loc": [90, 5, 97], "filenames": ["includes/html/pages/bill.inc.php", "includes/html/pages/bill/addoreditbill.inc.php", "includes/html/table/bills.inc.php"], "fixing_code_end_loc": [91, 107, 146], "fixing_code_start_loc": [90, 5, 97], "message": "Cross-site Script... | 318 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* vi:set ts=8 sts=4 sw=4 noet:\n *\n * VIM - Vi IMproved\tby Bram Moolenaar\n *\n * Do \":help uganda\" in Vim to read copying and usage conditions.\n * Do \":help credits\" in Vim to see a list of people who contributed.\n * See README.txt for an overview of the Vim source code.\n */",
"/*\n * indent.c: Inden... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [2081, 87, 736], "buggy_code_start_loc": [2079, 1, 736], "filenames": ["src/indent.c", "src/testdir/test_lispwords.vim", "src/version.c"], "fixing_code_end_loc": [2084, 98, 739], "fixing_code_start_loc": [2079, 1, 737], "message": "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.", "... | 319 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* vi:set ts=8 sts=4 sw=4 noet:\n *\n * VIM - Vi IMproved\tby Bram Moolenaar\n *\n * Do \":help uganda\" in Vim to read copying and usage conditions.\n * Do \":help credits\" in Vim to see a list of people who contributed.\n * See README.txt for an overview of the Vim source code.\n */",
"/*\n * indent.c: Inden... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [2081, 87, 736], "buggy_code_start_loc": [2079, 1, 736], "filenames": ["src/indent.c", "src/testdir/test_lispwords.vim", "src/version.c"], "fixing_code_end_loc": [2084, 98, 739], "fixing_code_start_loc": [2079, 1, 737], "message": "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.", "... | 319 |
Determine whether the {function_name} code is vulnerable or not. | [
"\" Tests for 'lispwords' settings being global-local",
"\nset nocompatible viminfo+=nviminfo",
"func Test_global_local_lispwords()\n setglobal lispwords=foo,bar,baz\n setlocal lispwords-=foo | setlocal lispwords+=quux\n call assert_equal('foo,bar,baz', &g:lispwords)\n call assert_equal('bar,baz,quux', &l:l... | [
0,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [2081, 87, 736], "buggy_code_start_loc": [2079, 1, 736], "filenames": ["src/indent.c", "src/testdir/test_lispwords.vim", "src/version.c"], "fixing_code_end_loc": [2084, 98, 739], "fixing_code_start_loc": [2079, 1, 737], "message": "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.", "... | 319 |
Determine whether the {function_name} code is vulnerable or not. | [
"\" Tests for 'lispwords' settings being global-local.\n\" And other lisp indent stuff.",
"\nset nocompatible viminfo+=nviminfo",
"func Test_global_local_lispwords()\n setglobal lispwords=foo,bar,baz\n setlocal lispwords-=foo | setlocal lispwords+=quux\n call assert_equal('foo,bar,baz', &g:lispwords)\n cal... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [2081, 87, 736], "buggy_code_start_loc": [2079, 1, 736], "filenames": ["src/indent.c", "src/testdir/test_lispwords.vim", "src/version.c"], "fixing_code_end_loc": [2084, 98, 739], "fixing_code_start_loc": [2079, 1, 737], "message": "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.", "... | 319 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* vi:set ts=8 sts=4 sw=4 noet:\n *\n * VIM - Vi IMproved\t\tby Bram Moolenaar\n *\n * Do \":help uganda\" in Vim to read copying and usage conditions.\n * Do \":help credits\" in Vim to see a list of people who contributed.\n * See README.txt for an overview of the Vim source code.\n */",
"#include \"vim.h\"",... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [2081, 87, 736], "buggy_code_start_loc": [2079, 1, 736], "filenames": ["src/indent.c", "src/testdir/test_lispwords.vim", "src/version.c"], "fixing_code_end_loc": [2084, 98, 739], "fixing_code_start_loc": [2079, 1, 737], "message": "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.", "... | 319 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* vi:set ts=8 sts=4 sw=4 noet:\n *\n * VIM - Vi IMproved\t\tby Bram Moolenaar\n *\n * Do \":help uganda\" in Vim to read copying and usage conditions.\n * Do \":help credits\" in Vim to see a list of people who contributed.\n * See README.txt for an overview of the Vim source code.\n */",
"#include \"vim.h\"",... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [2081, 87, 736], "buggy_code_start_loc": [2079, 1, 736], "filenames": ["src/indent.c", "src/testdir/test_lispwords.vim", "src/version.c"], "fixing_code_end_loc": [2084, 98, 739], "fixing_code_start_loc": [2079, 1, 737], "message": "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.", "... | 319 |
Determine whether the {function_name} code is vulnerable or not. | [
"/**\n * FreeRDP: A Remote Desktop Protocol Implementation\n * File System Virtual Channel\n *\n * Copyright 2010-2011 Vic Lee\n * Copyright 2010-2012 Marc-Andre Moreau <marcandre.moreau@gmail.com>\n * Copyright 2015 Thincast Technologies GmbH\n * Copyright 2015 DI (FH) Martin Haimberger <martin.haimberger@thincast... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [357, 496, 447, 322, 308, 1001], "buggy_code_start_loc": [333, 480, 447, 145, 307, 94], "filenames": ["channels/drive/client/drive_main.c", "channels/printer/client/printer_main.c", "channels/rdpei/client/rdpei_main.c", "channels/serial/client/serial_main.c", "libfreerdp/core/gateway/rdg.c", "lib... | 320 |
Determine whether the {function_name} code is vulnerable or not. | [
"/**\n * FreeRDP: A Remote Desktop Protocol Implementation\n * File System Virtual Channel\n *\n * Copyright 2010-2011 Vic Lee\n * Copyright 2010-2012 Marc-Andre Moreau <marcandre.moreau@gmail.com>\n * Copyright 2015 Thincast Technologies GmbH\n * Copyright 2015 DI (FH) Martin Haimberger <martin.haimberger@thincast... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [357, 496, 447, 322, 308, 1001], "buggy_code_start_loc": [333, 480, 447, 145, 307, 94], "filenames": ["channels/drive/client/drive_main.c", "channels/printer/client/printer_main.c", "channels/rdpei/client/rdpei_main.c", "channels/serial/client/serial_main.c", "libfreerdp/core/gateway/rdg.c", "lib... | 320 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.