prompt stringclasses 1
value | completions listlengths 1 63.8k | labels listlengths 1 63.8k | source stringclasses 1
value | other_info stringlengths 2.06k 101k | index int64 0 6.83k |
|---|---|---|---|---|---|
Determine whether the {function_name} code is vulnerable or not. | [
"package io.metersphere.service.issue.client;",
"import io.metersphere.commons.exception.MSException;\nimport io.metersphere.commons.utils.JSON;\nimport io.metersphere.commons.utils.LogUtil;\nimport io.metersphere.commons.utils.UnicodeConvertUtils;",
"import io.metersphere.i18n.Translator;",
"import io.meters... | [
1,
1,
0,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [25, 113, 27, 22, 821, 90, 246, 337, 684, 42], "buggy_code_start_loc": [24, 109, 26, 18, 62, 90, 7, 9, 495, 3], "filenames": ["framework/gateway/src/main/java/io/metersphere/gateway/filter/SessionFilter.java", "framework/sdk-parent/xpack-interface/src/main/java/io/metersphere/xpack/track/issue/Is... | 329 |
Determine whether the {function_name} code is vulnerable or not. | [
"package io.metersphere.service.issue.client;",
"import io.metersphere.commons.exception.MSException;\nimport io.metersphere.commons.utils.JSON;\nimport io.metersphere.commons.utils.LogUtil;\nimport io.metersphere.commons.utils.UnicodeConvertUtils;",
"",
"import io.metersphere.service.issue.domain.zentao.*;\n... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [25, 113, 27, 22, 821, 90, 246, 337, 684, 42], "buggy_code_start_loc": [24, 109, 26, 18, 62, 90, 7, 9, 495, 3], "filenames": ["framework/gateway/src/main/java/io/metersphere/gateway/filter/SessionFilter.java", "framework/sdk-parent/xpack-interface/src/main/java/io/metersphere/xpack/track/issue/Is... | 329 |
Determine whether the {function_name} code is vulnerable or not. | [
"package io.metersphere.service.issue.platform;",
"import io.metersphere.base.domain.*;\nimport io.metersphere.base.mapper.AttachmentModuleRelationMapper;\nimport io.metersphere.base.mapper.IssuesMapper;\nimport io.metersphere.base.mapper.TestCaseIssuesMapper;\nimport io.metersphere.base.mapper.ext.ExtIssuesMappe... | [
1,
1,
0,
1,
1,
0,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [25, 113, 27, 22, 821, 90, 246, 337, 684, 42], "buggy_code_start_loc": [24, 109, 26, 18, 62, 90, 7, 9, 495, 3], "filenames": ["framework/gateway/src/main/java/io/metersphere/gateway/filter/SessionFilter.java", "framework/sdk-parent/xpack-interface/src/main/java/io/metersphere/xpack/track/issue/Is... | 329 |
Determine whether the {function_name} code is vulnerable or not. | [
"package io.metersphere.service.issue.platform;",
"import io.metersphere.base.domain.*;\nimport io.metersphere.base.mapper.AttachmentModuleRelationMapper;\nimport io.metersphere.base.mapper.IssuesMapper;\nimport io.metersphere.base.mapper.TestCaseIssuesMapper;\nimport io.metersphere.base.mapper.ext.ExtIssuesMappe... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [25, 113, 27, 22, 821, 90, 246, 337, 684, 42], "buggy_code_start_loc": [24, 109, 26, 18, 62, 90, 7, 9, 495, 3], "filenames": ["framework/gateway/src/main/java/io/metersphere/gateway/filter/SessionFilter.java", "framework/sdk-parent/xpack-interface/src/main/java/io/metersphere/xpack/track/issue/Is... | 329 |
Determine whether the {function_name} code is vulnerable or not. | [
"package io.metersphere.service.issue.platform;",
"import io.metersphere.base.domain.*;\nimport io.metersphere.commons.constants.IssuesManagePlatform;\nimport io.metersphere.commons.constants.IssuesStatus;\nimport io.metersphere.commons.constants.ZentaoIssuePlatformStatus;\nimport io.metersphere.commons.exception... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [25, 113, 27, 22, 821, 90, 246, 337, 684, 42], "buggy_code_start_loc": [24, 109, 26, 18, 62, 90, 7, 9, 495, 3], "filenames": ["framework/gateway/src/main/java/io/metersphere/gateway/filter/SessionFilter.java", "framework/sdk-parent/xpack-interface/src/main/java/io/metersphere/xpack/track/issue/Is... | 329 |
Determine whether the {function_name} code is vulnerable or not. | [
"package io.metersphere.service.issue.platform;",
"import io.metersphere.base.domain.*;\nimport io.metersphere.commons.constants.IssuesManagePlatform;\nimport io.metersphere.commons.constants.IssuesStatus;\nimport io.metersphere.commons.constants.ZentaoIssuePlatformStatus;\nimport io.metersphere.commons.exception... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [25, 113, 27, 22, 821, 90, 246, 337, 684, 42], "buggy_code_start_loc": [24, 109, 26, 18, 62, 90, 7, 9, 495, 3], "filenames": ["framework/gateway/src/main/java/io/metersphere/gateway/filter/SessionFilter.java", "framework/sdk-parent/xpack-interface/src/main/java/io/metersphere/xpack/track/issue/Is... | 329 |
Determine whether the {function_name} code is vulnerable or not. | [
"package io.metersphere.service.wapper;\n",
"import io.metersphere.commons.exception.MSException;\nimport io.metersphere.i18n.Translator;",
"import io.metersphere.service.PlatformPluginService;",
"",
"import org.apache.commons.lang3.StringUtils;",
"import org.springframework.http.HttpMethod;",
"import o... | [
1,
0,
1,
0,
1,
0,
1,
1,
1,
1,
1,
0,
1,
0,
1,
0,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [25, 113, 27, 22, 821, 90, 246, 337, 684, 42], "buggy_code_start_loc": [24, 109, 26, 18, 62, 90, 7, 9, 495, 3], "filenames": ["framework/gateway/src/main/java/io/metersphere/gateway/filter/SessionFilter.java", "framework/sdk-parent/xpack-interface/src/main/java/io/metersphere/xpack/track/issue/Is... | 329 |
Determine whether the {function_name} code is vulnerable or not. | [
"package io.metersphere.service.wapper;\n",
"import io.metersphere.commons.constants.IssuesManagePlatform;",
"import io.metersphere.service.PlatformPluginService;",
"import io.metersphere.service.issue.platform.IssueFactory;\nimport io.metersphere.xpack.track.dto.request.IssuesRequest;",
"import org.apache.... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [25, 113, 27, 22, 821, 90, 246, 337, 684, 42], "buggy_code_start_loc": [24, 109, 26, 18, 62, 90, 7, 9, 495, 3], "filenames": ["framework/gateway/src/main/java/io/metersphere/gateway/filter/SessionFilter.java", "framework/sdk-parent/xpack-interface/src/main/java/io/metersphere/xpack/track/issue/Is... | 329 |
Determine whether the {function_name} code is vulnerable or not. | [
"// CodeMirror, copyright (c) by Marijn Haverbeke and others\n// Distributed under an MIT license: https://codemirror.net/LICENSE",
"(function(mod) {\n if (typeof exports == \"object\" && typeof module == \"object\") // CommonJS\n mod(require(\"../../lib/codemirror\"));\n else if (typeof define == \"function... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [130], "buggy_code_start_loc": [129], "filenames": ["mode/javascript/javascript.js"], "fixing_code_end_loc": [130], "fixing_code_start_loc": [129], "message": "This affects the package codemirror before 5.58.2; the package org.apache.marmotta.webjars:codemirror before 5.58.2. The vulnerable regul... | 330 |
Determine whether the {function_name} code is vulnerable or not. | [
"// CodeMirror, copyright (c) by Marijn Haverbeke and others\n// Distributed under an MIT license: https://codemirror.net/LICENSE",
"(function(mod) {\n if (typeof exports == \"object\" && typeof module == \"object\") // CommonJS\n mod(require(\"../../lib/codemirror\"));\n else if (typeof define == \"function... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [130], "buggy_code_start_loc": [129], "filenames": ["mode/javascript/javascript.js"], "fixing_code_end_loc": [130], "fixing_code_start_loc": [129], "message": "This affects the package codemirror before 5.58.2; the package org.apache.marmotta.webjars:codemirror before 5.58.2. The vulnerable regul... | 330 |
Determine whether the {function_name} code is vulnerable or not. | [
"#ifndef ACOMMON_OBJSTACK__HPP\n#define ACOMMON_OBJSTACK__HPP",
"#include \"parm_string.hpp\"\n#include <stdlib.h>\n#include <assert.h>",
"",
"\nnamespace acommon {",
"class ObjStack\n{\n typedef unsigned char byte;\n struct Node\n {\n Node * next;\n byte data[1]; // hack for data[]\n };\n size_t... | [
1,
1,
0,
1,
1,
0,
1,
1,
1,
1,
0,
1,
0,
1,
1,
0,
1,
0,
1,
1,
1,
0,
1,
0,
1,
0,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [152], "buggy_code_start_loc": [7], "filenames": ["common/objstack.hpp"], "fixing_code_end_loc": [163], "fixing_code_start_loc": [8], "message": "objstack in GNU Aspell 0.60.8 has a heap-based buffer overflow in acommon::ObjStack::dup_top (called from acommon::StringMap::add and acommon::Config::... | 331 |
Determine whether the {function_name} code is vulnerable or not. | [
"#ifndef ACOMMON_OBJSTACK__HPP\n#define ACOMMON_OBJSTACK__HPP",
"#include \"parm_string.hpp\"\n#include <stdlib.h>\n#include <assert.h>",
"#include <stddef.h>",
"\nnamespace acommon {",
"class ObjStack\n{\n typedef unsigned char byte;\n struct Node\n {\n Node * next;\n byte data[1]; // hack for dat... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [152], "buggy_code_start_loc": [7], "filenames": ["common/objstack.hpp"], "fixing_code_end_loc": [163], "fixing_code_start_loc": [8], "message": "objstack in GNU Aspell 0.60.8 has a heap-based buffer overflow in acommon::ObjStack::dup_top (called from acommon::StringMap::add and acommon::Config::... | 331 |
Determine whether the {function_name} code is vulnerable or not. | [
"{\n \"name\": \"shopware/shopware\",\n \"description\": \"Shopware is the next generation of open source e-commerce software made in Germany\",\n \"keywords\": [\"shopware\", \"shop\"],\n \"homepage\": \"http://www.shopware.com\",\n \"type\": \"project\",\n \"license\": [\n \"AGPL-3.0\",\n... | [
1,
0,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [94, 7070, 241, 235], "buggy_code_start_loc": [86, 7, 24, 150], "filenames": ["composer.json", "composer.lock", "engine/Shopware/Plugins/Default/Frontend/InputFilter/Bootstrap.php", "tests/Unit/Plugin/Frontend/InputFilter/FilterTest.php"], "fixing_code_end_loc": [97, 7244, 271, 282], "fixing_code... | 332 |
Determine whether the {function_name} code is vulnerable or not. | [
"{\n \"name\": \"shopware/shopware\",\n \"description\": \"Shopware is the next generation of open source e-commerce software made in Germany\",\n \"keywords\": [\"shopware\", \"shop\"],\n \"homepage\": \"http://www.shopware.com\",\n \"type\": \"project\",\n \"license\": [\n \"AGPL-3.0\",\n... | [
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [94, 7070, 241, 235], "buggy_code_start_loc": [86, 7, 24, 150], "filenames": ["composer.json", "composer.lock", "engine/Shopware/Plugins/Default/Frontend/InputFilter/Bootstrap.php", "tests/Unit/Plugin/Frontend/InputFilter/FilterTest.php"], "fixing_code_end_loc": [97, 7244, 271, 282], "fixing_code... | 332 |
Determine whether the {function_name} code is vulnerable or not. | [
"{\n \"_readme\": [\n \"This file locks the dependencies of your project to a known state\",\n \"Read more about it at https://getcomposer.org/doc/01-basic-usage.md#installing-dependencies\",\n \"This file is @generated automatically\"\n ],",
" \"content-hash\": \"04af69417e3a2d261d9... | [
1,
0,
1,
0,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [94, 7070, 241, 235], "buggy_code_start_loc": [86, 7, 24, 150], "filenames": ["composer.json", "composer.lock", "engine/Shopware/Plugins/Default/Frontend/InputFilter/Bootstrap.php", "tests/Unit/Plugin/Frontend/InputFilter/FilterTest.php"], "fixing_code_end_loc": [97, 7244, 271, 282], "fixing_code... | 332 |
Determine whether the {function_name} code is vulnerable or not. | [
"{\n \"_readme\": [\n \"This file locks the dependencies of your project to a known state\",\n \"Read more about it at https://getcomposer.org/doc/01-basic-usage.md#installing-dependencies\",\n \"This file is @generated automatically\"\n ],",
" \"content-hash\": \"aa9e7479e5376871d41... | [
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [94, 7070, 241, 235], "buggy_code_start_loc": [86, 7, 24, 150], "filenames": ["composer.json", "composer.lock", "engine/Shopware/Plugins/Default/Frontend/InputFilter/Bootstrap.php", "tests/Unit/Plugin/Frontend/InputFilter/FilterTest.php"], "fixing_code_end_loc": [97, 7244, 271, 282], "fixing_code... | 332 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/**\n * Shopware 5\n * Copyright (c) shopware AG\n *\n * According to our dual licensing model, this program can be used either\n * under the terms of the GNU Affero General Public License, version 3,\n * or under a proprietary license.\n *\n * The texts of the GNU Affero General Public License with an addi... | [
1,
0,
1,
0,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
0,
0,
1,
1,
0,
1,
0,
1,
0,
1,
1,
1,
0,
1,
1,
0,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1,
0,
1,
1,
0,
1,
0,
1,
0,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [94, 7070, 241, 235], "buggy_code_start_loc": [86, 7, 24, 150], "filenames": ["composer.json", "composer.lock", "engine/Shopware/Plugins/Default/Frontend/InputFilter/Bootstrap.php", "tests/Unit/Plugin/Frontend/InputFilter/FilterTest.php"], "fixing_code_end_loc": [97, 7244, 271, 282], "fixing_code... | 332 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/**\n * Shopware 5\n * Copyright (c) shopware AG\n *\n * According to our dual licensing model, this program can be used either\n * under the terms of the GNU Affero General Public License, version 3,\n * or under a proprietary license.\n *\n * The texts of the GNU Affero General Public License with an addi... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [94, 7070, 241, 235], "buggy_code_start_loc": [86, 7, 24, 150], "filenames": ["composer.json", "composer.lock", "engine/Shopware/Plugins/Default/Frontend/InputFilter/Bootstrap.php", "tests/Unit/Plugin/Frontend/InputFilter/FilterTest.php"], "fixing_code_end_loc": [97, 7244, 271, 282], "fixing_code... | 332 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/**\n * Shopware 5\n * Copyright (c) shopware AG\n *\n * According to our dual licensing model, this program can be used either\n * under the terms of the GNU Affero General Public License, version 3,\n * or under a proprietary license.\n *\n * The texts of the GNU Affero General Public License with an addi... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
0,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [94, 7070, 241, 235], "buggy_code_start_loc": [86, 7, 24, 150], "filenames": ["composer.json", "composer.lock", "engine/Shopware/Plugins/Default/Frontend/InputFilter/Bootstrap.php", "tests/Unit/Plugin/Frontend/InputFilter/FilterTest.php"], "fixing_code_end_loc": [97, 7244, 271, 282], "fixing_code... | 332 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/**\n * Shopware 5\n * Copyright (c) shopware AG\n *\n * According to our dual licensing model, this program can be used either\n * under the terms of the GNU Affero General Public License, version 3,\n * or under a proprietary license.\n *\n * The texts of the GNU Affero General Public License with an addi... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [94, 7070, 241, 235], "buggy_code_start_loc": [86, 7, 24, 150], "filenames": ["composer.json", "composer.lock", "engine/Shopware/Plugins/Default/Frontend/InputFilter/Bootstrap.php", "tests/Unit/Plugin/Frontend/InputFilter/FilterTest.php"], "fixing_code_end_loc": [97, 7244, 271, 282], "fixing_code... | 332 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*-\n * Copyright (c) 2003-2011 Tim Kientzle\n * Copyright (c) 2011-2012 Michihiro NAKAJIMA\n * All rights reserved.\n *\n * Redistribution and use in source and binary forms, with or without\n * modification, are permitted provided that the following conditions\n * are met:\n * 1. Redistributions of source code m... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1... | PreciseBugs | {"buggy_code_end_loc": [639], "buggy_code_start_loc": [594], "filenames": ["libarchive/archive_string.c"], "fixing_code_end_loc": [645], "fixing_code_start_loc": [594], "message": "In Libarchive 3.4.0, archive_wstring_append_from_mbs in archive_string.c has an out-of-bounds read because of an incorrect mbrtowc or mbtow... | 333 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*-\n * Copyright (c) 2003-2011 Tim Kientzle\n * Copyright (c) 2011-2012 Michihiro NAKAJIMA\n * All rights reserved.\n *\n * Redistribution and use in source and binary forms, with or without\n * modification, are permitted provided that the following conditions\n * are met:\n * 1. Redistributions of source code m... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [639], "buggy_code_start_loc": [594], "filenames": ["libarchive/archive_string.c"], "fixing_code_end_loc": [645], "fixing_code_start_loc": [594], "message": "In Libarchive 3.4.0, archive_wstring_append_from_mbs in archive_string.c has an out-of-bounds read because of an incorrect mbrtowc or mbtow... | 333 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"namespace BookStack\\Actions;",
"use BookStack\\Auth\\Permissions\\PermissionService;\nuse BookStack\\Auth\\User;\nuse BookStack\\Entities\\Models\\Book;\nuse BookStack\\Entities\\Models\\Chapter;\nuse BookStack\\Entities\\Models\\Entity;\nuse BookStack\\Entities\\Models\\Page;\nuse BookStack\\Interfa... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [137, 672, 84, 226], "buggy_code_start_loc": [136, 604, 6, 226], "filenames": ["app/Actions/ActivityService.php", "app/Auth/Permissions/PermissionService.php", "app/Exceptions/Handler.php", "tests/Api/AttachmentsApiTest.php"], "fixing_code_end_loc": [137, 696, 91, 250], "fixing_code_start_loc": [... | 334 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"namespace BookStack\\Actions;",
"use BookStack\\Auth\\Permissions\\PermissionService;\nuse BookStack\\Auth\\User;\nuse BookStack\\Entities\\Models\\Book;\nuse BookStack\\Entities\\Models\\Chapter;\nuse BookStack\\Entities\\Models\\Entity;\nuse BookStack\\Entities\\Models\\Page;\nuse BookStack\\Interfa... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [137, 672, 84, 226], "buggy_code_start_loc": [136, 604, 6, 226], "filenames": ["app/Actions/ActivityService.php", "app/Auth/Permissions/PermissionService.php", "app/Exceptions/Handler.php", "tests/Api/AttachmentsApiTest.php"], "fixing_code_end_loc": [137, 696, 91, 250], "fixing_code_start_loc": [... | 334 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"namespace BookStack\\Auth\\Permissions;",
"use BookStack\\Auth\\Role;\nuse BookStack\\Auth\\User;\nuse BookStack\\Entities\\Models\\Book;\nuse BookStack\\Entities\\Models\\BookChild;\nuse BookStack\\Entities\\Models\\Bookshelf;\nuse BookStack\\Entities\\Models\\Chapter;\nuse BookStack\\Entities\\Model... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [137, 672, 84, 226], "buggy_code_start_loc": [136, 604, 6, 226], "filenames": ["app/Actions/ActivityService.php", "app/Auth/Permissions/PermissionService.php", "app/Exceptions/Handler.php", "tests/Api/AttachmentsApiTest.php"], "fixing_code_end_loc": [137, 696, 91, 250], "fixing_code_start_loc": [... | 334 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"namespace BookStack\\Auth\\Permissions;",
"use BookStack\\Auth\\Role;\nuse BookStack\\Auth\\User;\nuse BookStack\\Entities\\Models\\Book;\nuse BookStack\\Entities\\Models\\BookChild;\nuse BookStack\\Entities\\Models\\Bookshelf;\nuse BookStack\\Entities\\Models\\Chapter;\nuse BookStack\\Entities\\Model... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [137, 672, 84, 226], "buggy_code_start_loc": [136, 604, 6, 226], "filenames": ["app/Actions/ActivityService.php", "app/Auth/Permissions/PermissionService.php", "app/Exceptions/Handler.php", "tests/Api/AttachmentsApiTest.php"], "fixing_code_end_loc": [137, 696, 91, 250], "fixing_code_start_loc": [... | 334 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"namespace BookStack\\Exceptions;",
"use Exception;\nuse Illuminate\\Auth\\AuthenticationException;",
"",
"use Illuminate\\Foundation\\Exceptions\\Handler as ExceptionHandler;\nuse Illuminate\\Http\\JsonResponse;\nuse Illuminate\\Http\\Request;\nuse Illuminate\\Validation\\ValidationException;\nuse... | [
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [137, 672, 84, 226], "buggy_code_start_loc": [136, 604, 6, 226], "filenames": ["app/Actions/ActivityService.php", "app/Auth/Permissions/PermissionService.php", "app/Exceptions/Handler.php", "tests/Api/AttachmentsApiTest.php"], "fixing_code_end_loc": [137, 696, 91, 250], "fixing_code_start_loc": [... | 334 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"namespace BookStack\\Exceptions;",
"use Exception;\nuse Illuminate\\Auth\\AuthenticationException;",
"use Illuminate\\Database\\Eloquent\\ModelNotFoundException;",
"use Illuminate\\Foundation\\Exceptions\\Handler as ExceptionHandler;\nuse Illuminate\\Http\\JsonResponse;\nuse Illuminate\\Http\\Requ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [137, 672, 84, 226], "buggy_code_start_loc": [136, 604, 6, 226], "filenames": ["app/Actions/ActivityService.php", "app/Auth/Permissions/PermissionService.php", "app/Exceptions/Handler.php", "tests/Api/AttachmentsApiTest.php"], "fixing_code_end_loc": [137, 696, 91, 250], "fixing_code_start_loc": [... | 334 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"namespace Tests\\Api;",
"use BookStack\\Entities\\Models\\Page;\nuse BookStack\\Uploads\\Attachment;\nuse Illuminate\\Http\\UploadedFile;\nuse Tests\\TestCase;",
"class AttachmentsApiTest extends TestCase\n{\n use TestsApi;",
" protected $baseEndpoint = '/api/attachments';",
" public fu... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [137, 672, 84, 226], "buggy_code_start_loc": [136, 604, 6, 226], "filenames": ["app/Actions/ActivityService.php", "app/Auth/Permissions/PermissionService.php", "app/Exceptions/Handler.php", "tests/Api/AttachmentsApiTest.php"], "fixing_code_end_loc": [137, 696, 91, 250], "fixing_code_start_loc": [... | 334 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"namespace Tests\\Api;",
"use BookStack\\Entities\\Models\\Page;\nuse BookStack\\Uploads\\Attachment;\nuse Illuminate\\Http\\UploadedFile;\nuse Tests\\TestCase;",
"class AttachmentsApiTest extends TestCase\n{\n use TestsApi;",
" protected $baseEndpoint = '/api/attachments';",
" public fu... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [137, 672, 84, 226], "buggy_code_start_loc": [136, 604, 6, 226], "filenames": ["app/Actions/ActivityService.php", "app/Auth/Permissions/PermissionService.php", "app/Exceptions/Handler.php", "tests/Api/AttachmentsApiTest.php"], "fixing_code_end_loc": [137, 696, 91, 250], "fixing_code_start_loc": [... | 334 |
Determine whether the {function_name} code is vulnerable or not. | [
"v1.9.2 - February 23, 2017 ",
"Thanks to @hannob for finding some Out-of-bound exceptions in memory handline.\n* [SECURITY] An invalid memory access (heap overrun) in handling LONG datatypes\n* [SECURITY] Missing a check for fields of size 0",
"",
"\nThis version & the previous 1.9.1 resolves the following ... | [
1,
1,
0,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [5, 1545], "buggy_code_start_loc": [5, 1544], "filenames": ["ChangeLog", "lib/ytnef.c"], "fixing_code_end_loc": [7, 1545], "fixing_code_start_loc": [6, 1544], "message": "An issue was discovered in ytnef before 1.9.2. There is a potential heap-based buffer over-read on incoming Compressed RTF Str... | 335 |
Determine whether the {function_name} code is vulnerable or not. | [
"v1.9.2 - February 23, 2017 ",
"Thanks to @hannob for finding some Out-of-bound exceptions in memory handline.\n* [SECURITY] An invalid memory access (heap overrun) in handling LONG datatypes\n* [SECURITY] Missing a check for fields of size 0",
"* [SECURITY] Potential buffer overrun on incoming Compressed RTF S... | [
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [5, 1545], "buggy_code_start_loc": [5, 1544], "filenames": ["ChangeLog", "lib/ytnef.c"], "fixing_code_end_loc": [7, 1545], "fixing_code_start_loc": [6, 1544], "message": "An issue was discovered in ytnef before 1.9.2. There is a potential heap-based buffer over-read on incoming Compressed RTF Str... | 335 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n* Yerase's TNEF Stream Reader Library\n* Copyright (C) 2003 Randall E. Hand\n*\n* This program is free software; you can redistribute it and/or modify\n* it under the terms of the GNU General Public License as published by\n* the Free Software Foundation; either version 2 of the License, or\n* ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [5, 1545], "buggy_code_start_loc": [5, 1544], "filenames": ["ChangeLog", "lib/ytnef.c"], "fixing_code_end_loc": [7, 1545], "fixing_code_start_loc": [6, 1544], "message": "An issue was discovered in ytnef before 1.9.2. There is a potential heap-based buffer over-read on incoming Compressed RTF Str... | 335 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n* Yerase's TNEF Stream Reader Library\n* Copyright (C) 2003 Randall E. Hand\n*\n* This program is free software; you can redistribute it and/or modify\n* it under the terms of the GNU General Public License as published by\n* the Free Software Foundation; either version 2 of the License, or\n* ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [5, 1545], "buggy_code_start_loc": [5, 1544], "filenames": ["ChangeLog", "lib/ytnef.c"], "fixing_code_end_loc": [7, 1545], "fixing_code_start_loc": [6, 1544], "message": "An issue was discovered in ytnef before 1.9.2. There is a potential heap-based buffer over-read on incoming Compressed RTF Str... | 335 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"require_once 'php/model/remotehtml/RemoteHTMLContent.php';\nrequire_once 'php/model/remotehtml/dateparsing/DateFieldInformationFactory.php';",
"class RemoteHtmlContentDataAccess {\n public static function getAll() {\n return self::getForQueryString('SELECT * FROM \"DevNewsAggregatorConfigura... | [
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [24], "buggy_code_start_loc": [23], "filenames": ["php/data_access/RemoteHtmlContentDataAccess.php"], "fixing_code_end_loc": [24], "fixing_code_start_loc": [23], "message": "A vulnerability was found in stevejagodzinski DevNewsAggregator. It has been rated as critical. Affected by this issue is t... | 336 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"require_once 'php/model/remotehtml/RemoteHTMLContent.php';\nrequire_once 'php/model/remotehtml/dateparsing/DateFieldInformationFactory.php';",
"class RemoteHtmlContentDataAccess {\n public static function getAll() {\n return self::getForQueryString('SELECT * FROM \"DevNewsAggregatorConfigura... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [24], "buggy_code_start_loc": [23], "filenames": ["php/data_access/RemoteHtmlContentDataAccess.php"], "fixing_code_end_loc": [24], "fixing_code_start_loc": [23], "message": "A vulnerability was found in stevejagodzinski DevNewsAggregator. It has been rated as critical. Affected by this issue is t... | 336 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * f_fs.c -- user mode file system API for USB composite function controllers\n *\n * Copyright (C) 2010 Samsung Electronics\n * Author: Michal Nazarewicz <mina86@mina86.com>\n *\n * Based on inode.c (GadgetFS) which was:\n * Copyright (C) 2003-2004 David Brownell\n * Copyright (C) 2003 Agilent Technologies\n ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [667], "buggy_code_start_loc": [648], "filenames": ["drivers/usb/gadget/function/f_fs.c"], "fixing_code_end_loc": [665], "fixing_code_start_loc": [649], "message": "Use-after-free vulnerability in the ffs_user_copy_worker function in drivers/usb/gadget/function/f_fs.c in the Linux kernel before 4... | 337 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * f_fs.c -- user mode file system API for USB composite function controllers\n *\n * Copyright (C) 2010 Samsung Electronics\n * Author: Michal Nazarewicz <mina86@mina86.com>\n *\n * Based on inode.c (GadgetFS) which was:\n * Copyright (C) 2003-2004 David Brownell\n * Copyright (C) 2003 Agilent Technologies\n ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [667], "buggy_code_start_loc": [648], "filenames": ["drivers/usb/gadget/function/f_fs.c"], "fixing_code_end_loc": [665], "fixing_code_start_loc": [649], "message": "Use-after-free vulnerability in the ffs_user_copy_worker function in drivers/usb/gadget/function/f_fs.c in the Linux kernel before 4... | 337 |
Determine whether the {function_name} code is vulnerable or not. | [
"// Copyright 2014 Manu Martinez-Almeida. All rights reserved.\n// Use of this source code is governed by a MIT style\n// license that can be found in the LICENSE file.",
"package gin",
"import (\n\t\"fmt\"\n\t\"html/template\"\n\t\"net\"\n\t\"net/http\"",
"\t\"net/url\"",
"\t\"os\"\n\t\"path\"",
"",
"\... | [
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [674, 198], "buggy_code_start_loc": [12, 189], "filenames": ["gin.go", "routes_test.go"], "fixing_code_end_loc": [674, 202], "fixing_code_start_loc": [11, 189], "message": "Versions of the package github.com/gin-gonic/gin before 1.9.0 are vulnerable to Improper Input Validation by allowing an att... | 338 |
Determine whether the {function_name} code is vulnerable or not. | [
"// Copyright 2014 Manu Martinez-Almeida. All rights reserved.\n// Use of this source code is governed by a MIT style\n// license that can be found in the LICENSE file.",
"package gin",
"import (\n\t\"fmt\"\n\t\"html/template\"\n\t\"net\"\n\t\"net/http\"",
"",
"\t\"os\"\n\t\"path\"",
"\t\"regexp\"",
"\t... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [674, 198], "buggy_code_start_loc": [12, 189], "filenames": ["gin.go", "routes_test.go"], "fixing_code_end_loc": [674, 202], "fixing_code_start_loc": [11, 189], "message": "Versions of the package github.com/gin-gonic/gin before 1.9.0 are vulnerable to Improper Input Validation by allowing an att... | 338 |
Determine whether the {function_name} code is vulnerable or not. | [
"// Copyright 2014 Manu Martinez-Almeida. All rights reserved.\n// Use of this source code is governed by a MIT style\n// license that can be found in the LICENSE file.",
"package gin",
"import (\n\t\"fmt\"\n\t\"net/http\"\n\t\"net/http/httptest\"\n\t\"os\"\n\t\"path/filepath\"\n\t\"testing\"",
"\t\"github.co... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
0,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [674, 198], "buggy_code_start_loc": [12, 189], "filenames": ["gin.go", "routes_test.go"], "fixing_code_end_loc": [674, 202], "fixing_code_start_loc": [11, 189], "message": "Versions of the package github.com/gin-gonic/gin before 1.9.0 are vulnerable to Improper Input Validation by allowing an att... | 338 |
Determine whether the {function_name} code is vulnerable or not. | [
"// Copyright 2014 Manu Martinez-Almeida. All rights reserved.\n// Use of this source code is governed by a MIT style\n// license that can be found in the LICENSE file.",
"package gin",
"import (\n\t\"fmt\"\n\t\"net/http\"\n\t\"net/http/httptest\"\n\t\"os\"\n\t\"path/filepath\"\n\t\"testing\"",
"\t\"github.co... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [674, 198], "buggy_code_start_loc": [12, 189], "filenames": ["gin.go", "routes_test.go"], "fixing_code_end_loc": [674, 202], "fixing_code_start_loc": [11, 189], "message": "Versions of the package github.com/gin-gonic/gin before 1.9.0 are vulnerable to Improper Input Validation by allowing an att... | 338 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Server-side procedures for NFSv4.\n *\n * Copyright (c) 2002 The Regents of the University of Michigan.\n * All rights reserved.\n *\n * Kendrick Smith <kmsmith@umich.edu>\n * Andy Adamson <andros@umich.edu>\n *\n * Redistribution and use in source and binary forms, with or without\n * modification... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1263], "buggy_code_start_loc": [1262], "filenames": ["fs/nfsd/nfs4proc.c"], "fixing_code_end_loc": [1264], "fixing_code_start_loc": [1262], "message": "The NFSv4 server in the Linux kernel before 4.11.3 does not properly validate the layout type when processing the NFSv4 pNFS GETDEVICEINFO or LA... | 339 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Server-side procedures for NFSv4.\n *\n * Copyright (c) 2002 The Regents of the University of Michigan.\n * All rights reserved.\n *\n * Kendrick Smith <kmsmith@umich.edu>\n * Andy Adamson <andros@umich.edu>\n *\n * Redistribution and use in source and binary forms, with or without\n * modification... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1263], "buggy_code_start_loc": [1262], "filenames": ["fs/nfsd/nfs4proc.c"], "fixing_code_end_loc": [1264], "fixing_code_start_loc": [1262], "message": "The NFSv4 server in the Linux kernel before 4.11.3 does not properly validate the layout type when processing the NFSv4 pNFS GETDEVICEINFO or LA... | 339 |
Determine whether the {function_name} code is vulnerable or not. | [
"# -*- coding: utf-8 -*-",
"# This file is part of the Calibre-Web (https://github.com/janeczku/calibre-web)\n# Copyright (C) 2012-2019 cervinko, idalin, SiphonSquirrel, ouzklcn, akushsky,\n# OzzieIsaacs, bodybybuddha, jkrehm, matthazinski, janeczku\n#\n# This program is free softw... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [741], "buggy_code_start_loc": [737], "filenames": ["cps/helper.py"], "fixing_code_end_loc": [741], "fixing_code_start_loc": [737], "message": "Server-Side Request Forgery (SSRF) in GitHub repository janeczku/calibre-web prior to 0.6.17.", "other": {"cve": {"cisaActionDue": null, "cisaExploitAdd"... | 340 |
Determine whether the {function_name} code is vulnerable or not. | [
"# -*- coding: utf-8 -*-",
"# This file is part of the Calibre-Web (https://github.com/janeczku/calibre-web)\n# Copyright (C) 2012-2019 cervinko, idalin, SiphonSquirrel, ouzklcn, akushsky,\n# OzzieIsaacs, bodybybuddha, jkrehm, matthazinski, janeczku\n#\n# This program is free softw... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [741], "buggy_code_start_loc": [737], "filenames": ["cps/helper.py"], "fixing_code_end_loc": [741], "fixing_code_start_loc": [737], "message": "Server-Side Request Forgery (SSRF) in GitHub repository janeczku/calibre-web prior to 0.6.17.", "other": {"cve": {"cisaActionDue": null, "cisaExploitAdd"... | 340 |
Determine whether the {function_name} code is vulnerable or not. | [
"# frozen_string_literal: true",
"# Copyright (c) 2008-2013 Michael Dvorkin and contributors.\n#\n# Fat Free CRM is freely distributable under the terms of MIT license.\n# See MIT-LICENSE file or http://www.opensource.org/licenses/mit-license.php\n#-----------------------------------------------------------------... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [191, 13], "buggy_code_start_loc": [191, 12], "filenames": ["app/models/polymorphic/task.rb", "lib/fat_free_crm/version.rb"], "fixing_code_end_loc": [193, 13], "fixing_code_start_loc": [192, 12], "message": "fat_free_crm is a an open source, Ruby on Rails customer relationship management platform... | 341 |
Determine whether the {function_name} code is vulnerable or not. | [
"# frozen_string_literal: true",
"# Copyright (c) 2008-2013 Michael Dvorkin and contributors.\n#\n# Fat Free CRM is freely distributable under the terms of MIT license.\n# See MIT-LICENSE file or http://www.opensource.org/licenses/mit-license.php\n#-----------------------------------------------------------------... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [191, 13], "buggy_code_start_loc": [191, 12], "filenames": ["app/models/polymorphic/task.rb", "lib/fat_free_crm/version.rb"], "fixing_code_end_loc": [193, 13], "fixing_code_start_loc": [192, 12], "message": "fat_free_crm is a an open source, Ruby on Rails customer relationship management platform... | 341 |
Determine whether the {function_name} code is vulnerable or not. | [
"# frozen_string_literal: true",
"# Copyright (c) 2008-2013 Michael Dvorkin and contributors.\n#\n# Fat Free CRM is freely distributable under the terms of MIT license.\n# See MIT-LICENSE file or http://www.opensource.org/licenses/mit-license.php\n#-----------------------------------------------------------------... | [
1,
1,
0,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [191, 13], "buggy_code_start_loc": [191, 12], "filenames": ["app/models/polymorphic/task.rb", "lib/fat_free_crm/version.rb"], "fixing_code_end_loc": [193, 13], "fixing_code_start_loc": [192, 12], "message": "fat_free_crm is a an open source, Ruby on Rails customer relationship management platform... | 341 |
Determine whether the {function_name} code is vulnerable or not. | [
"# frozen_string_literal: true",
"# Copyright (c) 2008-2013 Michael Dvorkin and contributors.\n#\n# Fat Free CRM is freely distributable under the terms of MIT license.\n# See MIT-LICENSE file or http://www.opensource.org/licenses/mit-license.php\n#-----------------------------------------------------------------... | [
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [191, 13], "buggy_code_start_loc": [191, 12], "filenames": ["app/models/polymorphic/task.rb", "lib/fat_free_crm/version.rb"], "fixing_code_end_loc": [193, 13], "fixing_code_start_loc": [192, 12], "message": "fat_free_crm is a an open source, Ruby on Rails customer relationship management platform... | 341 |
Determine whether the {function_name} code is vulnerable or not. | [
"/**\n * xrdp: A Remote Desktop Protocol server.\n *\n * Copyright (C) Jay Sorg 2004-2015\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licen... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
0,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [309], "buggy_code_start_loc": [278], "filenames": ["sesman/sesman.c"], "fixing_code_end_loc": [312], "fixing_code_start_loc": [279], "message": "xrdp is an open source remote desktop protocol (RDP) server. In affected versions an integer underflow leading to a heap overflow in the sesman server ... | 342 |
Determine whether the {function_name} code is vulnerable or not. | [
"/**\n * xrdp: A Remote Desktop Protocol server.\n *\n * Copyright (C) Jay Sorg 2004-2015\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licen... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [309], "buggy_code_start_loc": [278], "filenames": ["sesman/sesman.c"], "fixing_code_end_loc": [312], "fixing_code_start_loc": [279], "message": "xrdp is an open source remote desktop protocol (RDP) server. In affected versions an integer underflow leading to a heap overflow in the sesman server ... | 342 |
Determine whether the {function_name} code is vulnerable or not. | [
"# Change Log\nAll notable changes to this project will be documented in this file.",
"",
"\n## 1.0.3 - 2019-03-24\n### Changed\n- Don't send 'Content-Type' header with pre-flight requests\n- Allow ruby array for vary header config",
"## 1.0.2 - 2017-10-22\n### Fixed\n- Automatically allow simple headers whe... | [
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [2, 190, 4, 146, 43], "buggy_code_start_loc": [2, 65, 3, 146, 43], "filenames": ["CHANGELOG.md", "lib/rack/cors.rb", "lib/rack/cors/version.rb", "test/unit/cors_test.rb", "test/unit/test.ru"], "fixing_code_end_loc": [7, 198, 4, 153, 45], "fixing_code_start_loc": [3, 66, 3, 147, 44], "message": "A... | 343 |
Determine whether the {function_name} code is vulnerable or not. | [
"# Change Log\nAll notable changes to this project will be documented in this file.",
"\n## 1.0.4 - 2019-11-13\n### Security\n- Escape and resolve path before evaluating resource rules (thanks to Colby Morgan)",
"\n## 1.0.3 - 2019-03-24\n### Changed\n- Don't send 'Content-Type' header with pre-flight requests\n... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [2, 190, 4, 146, 43], "buggy_code_start_loc": [2, 65, 3, 146, 43], "filenames": ["CHANGELOG.md", "lib/rack/cors.rb", "lib/rack/cors/version.rb", "test/unit/cors_test.rb", "test/unit/test.ru"], "fixing_code_end_loc": [7, 198, 4, 153, 45], "fixing_code_start_loc": [3, 66, 3, 147, 44], "message": "A... | 343 |
Determine whether the {function_name} code is vulnerable or not. | [
"require 'logger'",
"module Rack\n class Cors\n HTTP_ORIGIN = 'HTTP_ORIGIN'.freeze\n HTTP_X_ORIGIN = 'HTTP_X_ORIGIN'.freeze",
" HTTP_ACCESS_CONTROL_REQUEST_METHOD = 'HTTP_ACCESS_CONTROL_REQUEST_METHOD'.freeze\n HTTP_ACCESS_CONTROL_REQUEST_HEADERS = 'HTTP_ACCESS_CONTROL_REQUEST_HEADERS'.freeze",
... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
0,
1,
0,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
0,
1,
1,
0,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [2, 190, 4, 146, 43], "buggy_code_start_loc": [2, 65, 3, 146, 43], "filenames": ["CHANGELOG.md", "lib/rack/cors.rb", "lib/rack/cors/version.rb", "test/unit/cors_test.rb", "test/unit/test.ru"], "fixing_code_end_loc": [7, 198, 4, 153, 45], "fixing_code_start_loc": [3, 66, 3, 147, 44], "message": "A... | 343 |
Determine whether the {function_name} code is vulnerable or not. | [
"require 'logger'",
"module Rack\n class Cors\n HTTP_ORIGIN = 'HTTP_ORIGIN'.freeze\n HTTP_X_ORIGIN = 'HTTP_X_ORIGIN'.freeze",
" HTTP_ACCESS_CONTROL_REQUEST_METHOD = 'HTTP_ACCESS_CONTROL_REQUEST_METHOD'.freeze\n HTTP_ACCESS_CONTROL_REQUEST_HEADERS = 'HTTP_ACCESS_CONTROL_REQUEST_HEADERS'.freeze",
... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [2, 190, 4, 146, 43], "buggy_code_start_loc": [2, 65, 3, 146, 43], "filenames": ["CHANGELOG.md", "lib/rack/cors.rb", "lib/rack/cors/version.rb", "test/unit/cors_test.rb", "test/unit/test.ru"], "fixing_code_end_loc": [7, 198, 4, 153, 45], "fixing_code_start_loc": [3, 66, 3, 147, 44], "message": "A... | 343 |
Determine whether the {function_name} code is vulnerable or not. | [
"module Rack\n class Cors",
" VERSION = \"1.0.3\"",
" end\nend"
] | [
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [2, 190, 4, 146, 43], "buggy_code_start_loc": [2, 65, 3, 146, 43], "filenames": ["CHANGELOG.md", "lib/rack/cors.rb", "lib/rack/cors/version.rb", "test/unit/cors_test.rb", "test/unit/test.ru"], "fixing_code_end_loc": [7, 198, 4, 153, 45], "fixing_code_start_loc": [3, 66, 3, 147, 44], "message": "A... | 343 |
Determine whether the {function_name} code is vulnerable or not. | [
"module Rack\n class Cors",
" VERSION = \"1.0.4\"",
" end\nend"
] | [
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [2, 190, 4, 146, 43], "buggy_code_start_loc": [2, 65, 3, 146, 43], "filenames": ["CHANGELOG.md", "lib/rack/cors.rb", "lib/rack/cors/version.rb", "test/unit/cors_test.rb", "test/unit/test.ru"], "fixing_code_end_loc": [7, 198, 4, 153, 45], "fixing_code_start_loc": [3, 66, 3, 147, 44], "message": "A... | 343 |
Determine whether the {function_name} code is vulnerable or not. | [
"require 'minitest/autorun'\nrequire 'rack/test'\nrequire 'mocha/setup'\nrequire 'rack/cors'\nrequire 'ostruct'",
"Rack::Test::Session.class_eval do\n unless defined? :options\n def options(uri, params = {}, env = {}, &block)\n env = env_for(uri, env.merge(:method => \"OPTIONS\", :params => params))\n ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [2, 190, 4, 146, 43], "buggy_code_start_loc": [2, 65, 3, 146, 43], "filenames": ["CHANGELOG.md", "lib/rack/cors.rb", "lib/rack/cors/version.rb", "test/unit/cors_test.rb", "test/unit/test.ru"], "fixing_code_end_loc": [7, 198, 4, 153, 45], "fixing_code_start_loc": [3, 66, 3, 147, 44], "message": "A... | 343 |
Determine whether the {function_name} code is vulnerable or not. | [
"require 'minitest/autorun'\nrequire 'rack/test'\nrequire 'mocha/setup'\nrequire 'rack/cors'\nrequire 'ostruct'",
"Rack::Test::Session.class_eval do\n unless defined? :options\n def options(uri, params = {}, env = {}, &block)\n env = env_for(uri, env.merge(:method => \"OPTIONS\", :params => params))\n ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [2, 190, 4, 146, 43], "buggy_code_start_loc": [2, 65, 3, 146, 43], "filenames": ["CHANGELOG.md", "lib/rack/cors.rb", "lib/rack/cors/version.rb", "test/unit/cors_test.rb", "test/unit/test.ru"], "fixing_code_end_loc": [7, 198, 4, 153, 45], "fixing_code_start_loc": [3, 66, 3, 147, 44], "message": "A... | 343 |
Determine whether the {function_name} code is vulnerable or not. | [
"require 'rack/cors'",
"#use Rack::Cors, :debug => true, :logger => ::Logger.new(STDOUT) do\nuse Rack::Lint\nuse Rack::Cors do\n allow do\n origins 'localhost:3000',\n '127.0.0.1:3000',\n /http:\\/\\/192\\.168\\.0\\.\\d{1,3}(:\\d+)?/,\n 'file://',\n /http:\\/\\/(.*?... | [
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [2, 190, 4, 146, 43], "buggy_code_start_loc": [2, 65, 3, 146, 43], "filenames": ["CHANGELOG.md", "lib/rack/cors.rb", "lib/rack/cors/version.rb", "test/unit/cors_test.rb", "test/unit/test.ru"], "fixing_code_end_loc": [7, 198, 4, 153, 45], "fixing_code_start_loc": [3, 66, 3, 147, 44], "message": "A... | 343 |
Determine whether the {function_name} code is vulnerable or not. | [
"require 'rack/cors'",
"#use Rack::Cors, :debug => true, :logger => ::Logger.new(STDOUT) do\nuse Rack::Lint\nuse Rack::Cors do\n allow do\n origins 'localhost:3000',\n '127.0.0.1:3000',\n /http:\\/\\/192\\.168\\.0\\.\\d{1,3}(:\\d+)?/,\n 'file://',\n /http:\\/\\/(.*?... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [2, 190, 4, 146, 43], "buggy_code_start_loc": [2, 65, 3, 146, 43], "filenames": ["CHANGELOG.md", "lib/rack/cors.rb", "lib/rack/cors/version.rb", "test/unit/cors_test.rb", "test/unit/test.ru"], "fixing_code_end_loc": [7, 198, 4, 153, 45], "fixing_code_start_loc": [3, 66, 3, 147, 44], "message": "A... | 343 |
Determine whether the {function_name} code is vulnerable or not. | [
"import { extend } from 'flarum/extend';\nimport DiscussionListState from 'flarum/states/DiscussionListState';\nimport DiscussionListItem from 'flarum/components/DiscussionListItem';\nimport DiscussionPage from 'flarum/components/DiscussionPage';\nimport IndexPage from 'flarum/components/IndexPage';\nimport { trunc... | [
1,
1,
1,
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [25], "buggy_code_start_loc": [24], "filenames": ["js/src/forum/addStickyExcerpt.js"], "fixing_code_end_loc": [26], "fixing_code_start_loc": [24], "message": "Flarum is an open source discussion platform for websites. The \"Flarum Sticky\" extension versions 0.1.0-beta.14 and 0.1.0-beta.15 has a ... | 344 |
Determine whether the {function_name} code is vulnerable or not. | [
"import { extend } from 'flarum/extend';\nimport DiscussionListState from 'flarum/states/DiscussionListState';\nimport DiscussionListItem from 'flarum/components/DiscussionListItem';\nimport DiscussionPage from 'flarum/components/DiscussionPage';\nimport IndexPage from 'flarum/components/IndexPage';\nimport { trunc... | [
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [25], "buggy_code_start_loc": [24], "filenames": ["js/src/forum/addStickyExcerpt.js"], "fixing_code_end_loc": [26], "fixing_code_start_loc": [24], "message": "Flarum is an open source discussion platform for websites. The \"Flarum Sticky\" extension versions 0.1.0-beta.14 and 0.1.0-beta.15 has a ... | 344 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/*\n+---------------------------------------------------------------------------+\n| Revive Adserver |\n| http://www.revive-adserver.com |\n| ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [50, 37, 58, 33, 36, 32, 40], "buggy_code_start_loc": [50, 37, 42, 33, 36, 32, 40], "filenames": ["www/admin/banner-acl.php", "www/admin/banner-activate.php", "www/admin/banner-advanced.php", "www/admin/banner-modify.php", "www/admin/banner-swf.php", "www/admin/banner-zone.php", "www/admin/tracke... | 345 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/*\n+---------------------------------------------------------------------------+\n| Revive Adserver |\n| http://www.revive-adserver.com |\n| ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [50, 37, 58, 33, 36, 32, 40], "buggy_code_start_loc": [50, 37, 42, 33, 36, 32, 40], "filenames": ["www/admin/banner-acl.php", "www/admin/banner-activate.php", "www/admin/banner-advanced.php", "www/admin/banner-modify.php", "www/admin/banner-swf.php", "www/admin/banner-zone.php", "www/admin/tracke... | 345 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/*\n+---------------------------------------------------------------------------+\n| Revive Adserver |\n| http://www.revive-adserver.com |\n| ... | [
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [50, 37, 58, 33, 36, 32, 40], "buggy_code_start_loc": [50, 37, 42, 33, 36, 32, 40], "filenames": ["www/admin/banner-acl.php", "www/admin/banner-activate.php", "www/admin/banner-advanced.php", "www/admin/banner-modify.php", "www/admin/banner-swf.php", "www/admin/banner-zone.php", "www/admin/tracke... | 345 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/*\n+---------------------------------------------------------------------------+\n| Revive Adserver |\n| http://www.revive-adserver.com |\n| ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [50, 37, 58, 33, 36, 32, 40], "buggy_code_start_loc": [50, 37, 42, 33, 36, 32, 40], "filenames": ["www/admin/banner-acl.php", "www/admin/banner-activate.php", "www/admin/banner-advanced.php", "www/admin/banner-modify.php", "www/admin/banner-swf.php", "www/admin/banner-zone.php", "www/admin/tracke... | 345 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/*\n+---------------------------------------------------------------------------+\n| Revive Adserver |\n| http://www.revive-adserver.com |\n| ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [50, 37, 58, 33, 36, 32, 40], "buggy_code_start_loc": [50, 37, 42, 33, 36, 32, 40], "filenames": ["www/admin/banner-acl.php", "www/admin/banner-activate.php", "www/admin/banner-advanced.php", "www/admin/banner-modify.php", "www/admin/banner-swf.php", "www/admin/banner-zone.php", "www/admin/tracke... | 345 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/*\n+---------------------------------------------------------------------------+\n| Revive Adserver |\n| http://www.revive-adserver.com |\n| ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [50, 37, 58, 33, 36, 32, 40], "buggy_code_start_loc": [50, 37, 42, 33, 36, 32, 40], "filenames": ["www/admin/banner-acl.php", "www/admin/banner-activate.php", "www/admin/banner-advanced.php", "www/admin/banner-modify.php", "www/admin/banner-swf.php", "www/admin/banner-zone.php", "www/admin/tracke... | 345 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/*\n+---------------------------------------------------------------------------+\n| Revive Adserver |\n| http://www.revive-adserver.com |\n| ... | [
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [50, 37, 58, 33, 36, 32, 40], "buggy_code_start_loc": [50, 37, 42, 33, 36, 32, 40], "filenames": ["www/admin/banner-acl.php", "www/admin/banner-activate.php", "www/admin/banner-advanced.php", "www/admin/banner-modify.php", "www/admin/banner-swf.php", "www/admin/banner-zone.php", "www/admin/tracke... | 345 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/*\n+---------------------------------------------------------------------------+\n| Revive Adserver |\n| http://www.revive-adserver.com |\n| ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [50, 37, 58, 33, 36, 32, 40], "buggy_code_start_loc": [50, 37, 42, 33, 36, 32, 40], "filenames": ["www/admin/banner-acl.php", "www/admin/banner-activate.php", "www/admin/banner-advanced.php", "www/admin/banner-modify.php", "www/admin/banner-swf.php", "www/admin/banner-zone.php", "www/admin/tracke... | 345 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/*\n+---------------------------------------------------------------------------+\n| Revive Adserver |\n| http://www.revive-adserver.com |\n| ... | [
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [50, 37, 58, 33, 36, 32, 40], "buggy_code_start_loc": [50, 37, 42, 33, 36, 32, 40], "filenames": ["www/admin/banner-acl.php", "www/admin/banner-activate.php", "www/admin/banner-advanced.php", "www/admin/banner-modify.php", "www/admin/banner-swf.php", "www/admin/banner-zone.php", "www/admin/tracke... | 345 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/*\n+---------------------------------------------------------------------------+\n| Revive Adserver |\n| http://www.revive-adserver.com |\n| ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [50, 37, 58, 33, 36, 32, 40], "buggy_code_start_loc": [50, 37, 42, 33, 36, 32, 40], "filenames": ["www/admin/banner-acl.php", "www/admin/banner-activate.php", "www/admin/banner-advanced.php", "www/admin/banner-modify.php", "www/admin/banner-swf.php", "www/admin/banner-zone.php", "www/admin/tracke... | 345 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/*\n+---------------------------------------------------------------------------+\n| Revive Adserver |\n| http://www.revive-adserver.com |\n| ... | [
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [50, 37, 58, 33, 36, 32, 40], "buggy_code_start_loc": [50, 37, 42, 33, 36, 32, 40], "filenames": ["www/admin/banner-acl.php", "www/admin/banner-activate.php", "www/admin/banner-advanced.php", "www/admin/banner-modify.php", "www/admin/banner-swf.php", "www/admin/banner-zone.php", "www/admin/tracke... | 345 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/*\n+---------------------------------------------------------------------------+\n| Revive Adserver |\n| http://www.revive-adserver.com |\n| ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [50, 37, 58, 33, 36, 32, 40], "buggy_code_start_loc": [50, 37, 42, 33, 36, 32, 40], "filenames": ["www/admin/banner-acl.php", "www/admin/banner-activate.php", "www/admin/banner-advanced.php", "www/admin/banner-modify.php", "www/admin/banner-swf.php", "www/admin/banner-zone.php", "www/admin/tracke... | 345 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/*\n+---------------------------------------------------------------------------+\n| Revive Adserver |\n| http://www.revive-adserver.com |\n| ... | [
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [50, 37, 58, 33, 36, 32, 40], "buggy_code_start_loc": [50, 37, 42, 33, 36, 32, 40], "filenames": ["www/admin/banner-acl.php", "www/admin/banner-activate.php", "www/admin/banner-advanced.php", "www/admin/banner-modify.php", "www/admin/banner-swf.php", "www/admin/banner-zone.php", "www/admin/tracke... | 345 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/*\n+---------------------------------------------------------------------------+\n| Revive Adserver |\n| http://www.revive-adserver.com |\n| ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [50, 37, 58, 33, 36, 32, 40], "buggy_code_start_loc": [50, 37, 42, 33, 36, 32, 40], "filenames": ["www/admin/banner-acl.php", "www/admin/banner-activate.php", "www/admin/banner-advanced.php", "www/admin/banner-modify.php", "www/admin/banner-swf.php", "www/admin/banner-zone.php", "www/admin/tracke... | 345 |
Determine whether the {function_name} code is vulnerable or not. | [
"PATH\n remote: .\n specs:",
" view_component (2.48.0)",
" activesupport (>= 5.0.0, < 8.0)\n method_source (~> 1.0)",
"GEM\n remote: https://rubygems.org/\n specs:",
" actioncable (7.0.1)\n actionpack (= 7.0.1)\n activesupport (= 7.0.1)",
" nio4r (~> 2.0)\n websocke... | [
1,
0,
1,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
1,
0,
1,
0,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [282, 660, 109, 4, 60], "buggy_code_start_loc": [4, 55, 2, 4, 60], "filenames": ["Gemfile.lock", "docs/CHANGELOG.md", "lib/view_component/translatable.rb", "test/sandbox/app/components/translatable_component.yml", "test/view_component/translatable_test.rb"], "fixing_code_end_loc": [279, 673, 129,... | 346 |
Determine whether the {function_name} code is vulnerable or not. | [
"PATH\n remote: .\n specs:",
" view_component (2.49.0)",
" activesupport (>= 5.0.0, < 8.0)\n method_source (~> 1.0)",
"GEM\n remote: https://rubygems.org/\n specs:",
" actioncable (7.0.2)\n actionpack (= 7.0.2)\n activesupport (= 7.0.2)",
" nio4r (~> 2.0)\n websocke... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [282, 660, 109, 4, 60], "buggy_code_start_loc": [4, 55, 2, 4, 60], "filenames": ["Gemfile.lock", "docs/CHANGELOG.md", "lib/view_component/translatable.rb", "test/sandbox/app/components/translatable_component.yml", "test/view_component/translatable_test.rb"], "fixing_code_end_loc": [279, 673, 129,... | 346 |
Determine whether the {function_name} code is vulnerable or not. | [
"---\nlayout: default\ntitle: Changelog\n---",
"# Changelog",
"## main",
"* Support returning Arrays from i18n files, and support marking them as HTML-safe translations.",
" *foca*",
"* Add Cometeer and Framework to users list.",
" *Elia Schito*",
"* Update Microsoft Vale styles.",
" *Simon... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [282, 660, 109, 4, 60], "buggy_code_start_loc": [4, 55, 2, 4, 60], "filenames": ["Gemfile.lock", "docs/CHANGELOG.md", "lib/view_component/translatable.rb", "test/sandbox/app/components/translatable_component.yml", "test/view_component/translatable_test.rb"], "fixing_code_end_loc": [279, 673, 129,... | 346 |
Determine whether the {function_name} code is vulnerable or not. | [
"---\nlayout: default\ntitle: Changelog\n---",
"# Changelog",
"## main",
"* Support returning Arrays from i18n files, and support marking them as HTML-safe translations.",
" *foca*",
"* Add Cometeer and Framework to users list.",
" *Elia Schito*",
"* Update Microsoft Vale styles.",
" *Simon... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [282, 660, 109, 4, 60], "buggy_code_start_loc": [4, 55, 2, 4, 60], "filenames": ["Gemfile.lock", "docs/CHANGELOG.md", "lib/view_component/translatable.rb", "test/sandbox/app/components/translatable_component.yml", "test/view_component/translatable_test.rb"], "fixing_code_end_loc": [279, 673, 129,... | 346 |
Determine whether the {function_name} code is vulnerable or not. | [
"# frozen_string_literal: true\n",
"",
"require \"set\"\nrequire \"i18n\"\nrequire \"action_view/helpers/translation_helper\"\nrequire \"active_support/concern\"",
"module ViewComponent\n module Translatable\n extend ActiveSupport::Concern",
" HTML_SAFE_TRANSLATION_KEY = /(?:_|\\b)html\\z/.freeze",
... | [
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [282, 660, 109, 4, 60], "buggy_code_start_loc": [4, 55, 2, 4, 60], "filenames": ["Gemfile.lock", "docs/CHANGELOG.md", "lib/view_component/translatable.rb", "test/sandbox/app/components/translatable_component.yml", "test/view_component/translatable_test.rb"], "fixing_code_end_loc": [279, 673, 129,... | 346 |
Determine whether the {function_name} code is vulnerable or not. | [
"# frozen_string_literal: true\n",
"require \"erb\"",
"require \"set\"\nrequire \"i18n\"\nrequire \"action_view/helpers/translation_helper\"\nrequire \"active_support/concern\"",
"module ViewComponent\n module Translatable\n extend ActiveSupport::Concern",
" HTML_SAFE_TRANSLATION_KEY = /(?:_|\\b)html... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [282, 660, 109, 4, 60], "buggy_code_start_loc": [4, 55, 2, 4, 60], "filenames": ["Gemfile.lock", "docs/CHANGELOG.md", "lib/view_component/translatable.rb", "test/sandbox/app/components/translatable_component.yml", "test/view_component/translatable_test.rb"], "fixing_code_end_loc": [279, 673, 129,... | 346 |
Determine whether the {function_name} code is vulnerable or not. | [
"en:\n hello: \"Hello from sidecar translations!\"",
" hello_html: \"Hello from <strong>sidecar translations</strong>!\"",
"",
"\n html: \"hello <em>world</em>!\"",
" from:\n sidecar: This is coming from the sidecar",
" list:\n - This\n - returns\n - a list",
" list_html:\n - <em>Th... | [
1,
1,
0,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [282, 660, 109, 4, 60], "buggy_code_start_loc": [4, 55, 2, 4, 60], "filenames": ["Gemfile.lock", "docs/CHANGELOG.md", "lib/view_component/translatable.rb", "test/sandbox/app/components/translatable_component.yml", "test/view_component/translatable_test.rb"], "fixing_code_end_loc": [279, 673, 129,... | 346 |
Determine whether the {function_name} code is vulnerable or not. | [
"en:\n hello: \"Hello from sidecar translations!\"",
" hello_html: \"Hello from <strong>sidecar translations</strong>!\"",
"\n interpolated_html: \"There are %{horse_count} horses in the <strong>barn</strong>!\"",
"\n html: \"hello <em>world</em>!\"",
" from:\n sidecar: This is coming from the sidec... | [
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [282, 660, 109, 4, 60], "buggy_code_start_loc": [4, 55, 2, 4, 60], "filenames": ["Gemfile.lock", "docs/CHANGELOG.md", "lib/view_component/translatable.rb", "test/sandbox/app/components/translatable_component.yml", "test/view_component/translatable_test.rb"], "fixing_code_end_loc": [279, 673, 129,... | 346 |
Determine whether the {function_name} code is vulnerable or not. | [
"# frozen_string_literal: true",
"require \"test_helper\"",
"class TranslatableTest < ViewComponent::TestCase\n def test_isolated_translations\n render_inline(TranslatableComponent.new)",
" assert_selector(\"p.sidecar.shared-key\", text: \"Hello from sidecar translations!\")\n assert_selector(\"p.si... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [282, 660, 109, 4, 60], "buggy_code_start_loc": [4, 55, 2, 4, 60], "filenames": ["Gemfile.lock", "docs/CHANGELOG.md", "lib/view_component/translatable.rb", "test/sandbox/app/components/translatable_component.yml", "test/view_component/translatable_test.rb"], "fixing_code_end_loc": [279, 673, 129,... | 346 |
Determine whether the {function_name} code is vulnerable or not. | [
"# frozen_string_literal: true",
"require \"test_helper\"",
"class TranslatableTest < ViewComponent::TestCase\n def test_isolated_translations\n render_inline(TranslatableComponent.new)",
" assert_selector(\"p.sidecar.shared-key\", text: \"Hello from sidecar translations!\")\n assert_selector(\"p.si... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [282, 660, 109, 4, 60], "buggy_code_start_loc": [4, 55, 2, 4, 60], "filenames": ["Gemfile.lock", "docs/CHANGELOG.md", "lib/view_component/translatable.rb", "test/sandbox/app/components/translatable_component.yml", "test/view_component/translatable_test.rb"], "fixing_code_end_loc": [279, 673, 129,... | 346 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\ndefine( 'YOURLS_ADMIN', true );\ndefine( 'YOURLS_UPGRADING', true );\nrequire_once( dirname( __DIR__ ).'/includes/load-yourls.php' );\nrequire_once( YOURLS_INC.'/functions-upgrade.php' );\nrequire_once( YOURLS_INC.'/functions-install.php' );\nyourls_maybe_require_auth();",
"yourls_html_head( 'upgrade', yo... | [
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [33, 11, 10], "buggy_code_start_loc": [31, 11, 3], "filenames": ["admin/upgrade.php", "includes/functions-upgrade.php", "includes/version.php"], "fixing_code_end_loc": [33, 25, 19], "fixing_code_start_loc": [31, 12, 4], "message": "yourls is vulnerable to Improper Neutralization of Input During W... | 347 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\ndefine( 'YOURLS_ADMIN', true );\ndefine( 'YOURLS_UPGRADING', true );\nrequire_once( dirname( __DIR__ ).'/includes/load-yourls.php' );\nrequire_once( YOURLS_INC.'/functions-upgrade.php' );\nrequire_once( YOURLS_INC.'/functions-install.php' );\nyourls_maybe_require_auth();",
"yourls_html_head( 'upgrade', yo... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [33, 11, 10], "buggy_code_start_loc": [31, 11, 3], "filenames": ["admin/upgrade.php", "includes/functions-upgrade.php", "includes/version.php"], "fixing_code_end_loc": [33, 25, 19], "fixing_code_start_loc": [31, 12, 4], "message": "yourls is vulnerable to Improper Neutralization of Input During W... | 347 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/**\n * Upgrade YOURLS and DB schema\n *\n * Note to devs : prefer update function names using the SQL version, eg yourls_update_to_506(),\n * rather than using the YOURLS version number, eg yourls_update_to_18(). This is to allow having\n * multiple SQL update during the dev cycle of the same Y0URLS ve... | [
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [33, 11, 10], "buggy_code_start_loc": [31, 11, 3], "filenames": ["admin/upgrade.php", "includes/functions-upgrade.php", "includes/version.php"], "fixing_code_end_loc": [33, 25, 19], "fixing_code_start_loc": [31, 12, 4], "message": "yourls is vulnerable to Improper Neutralization of Input During W... | 347 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/**\n * Upgrade YOURLS and DB schema\n *\n * Note to devs : prefer update function names using the SQL version, eg yourls_update_to_506(),\n * rather than using the YOURLS version number, eg yourls_update_to_18(). This is to allow having\n * multiple SQL update during the dev cycle of the same Y0URLS ve... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [33, 11, 10], "buggy_code_start_loc": [31, 11, 3], "filenames": ["admin/upgrade.php", "includes/functions-upgrade.php", "includes/version.php"], "fixing_code_end_loc": [33, 25, 19], "fixing_code_start_loc": [31, 12, 4], "message": "yourls is vulnerable to Improper Neutralization of Input During W... | 347 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/**\n * YOURLS version",
"",
" *\n */\ndefine( 'YOURLS_VERSION', '1.8.3-dev' );",
"/**\n * YOURLS DB version. Increments when changes are made to the DB schema, to trigger a DB update\n *",
"",
" */\ndefine( 'YOURLS_DB_VERSION', '506' );"
] | [
1,
0,
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [33, 11, 10], "buggy_code_start_loc": [31, 11, 3], "filenames": ["admin/upgrade.php", "includes/functions-upgrade.php", "includes/version.php"], "fixing_code_end_loc": [33, 25, 19], "fixing_code_start_loc": [31, 12, 4], "message": "yourls is vulnerable to Improper Neutralization of Input During W... | 347 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/**\n * YOURLS version",
" *\n * Must be one of the following :\n * MAJOR.MINOR (eg 1.8)\n * MAJOR.MINOR.PATCH (1.8.1)\n * MAJOR.MINOR-SOMETHING (1.8-dev)\n * MAJOR.MINOR.PATCH-SOMETHING (1.8.1-donotuse)",
" *\n */\ndefine( 'YOURLS_VERSION', '1.8.3-dev' );",
"/**\n * YOURLS DB version. Inc... | [
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [33, 11, 10], "buggy_code_start_loc": [31, 11, 3], "filenames": ["admin/upgrade.php", "includes/functions-upgrade.php", "includes/version.php"], "fixing_code_end_loc": [33, 25, 19], "fixing_code_start_loc": [31, 12, 4], "message": "yourls is vulnerable to Improper Neutralization of Input During W... | 347 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* Apache 2.0 - Copyright 2007-2022 - pancake and dso\n class.c rewrite: Adam Pridgen <dso@rice.edu || adam.pridgen@thecoverofnight.com>\n */\n#include <stdio.h>\n#include <string.h>\n#include <stdlib.h>\n#include <stdarg.h>\n#include <r_types.h>\n#include <r_util.h>\n#include <r_bin.h>\n#include <math.h>\n#incl... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [7015], "buggy_code_start_loc": [3629], "filenames": ["shlr/java/class.c"], "fixing_code_end_loc": [7031], "fixing_code_start_loc": [3630], "message": "Buffer Access with Incorrect Length Value in GitHub repository radareorg/radare2 prior to 5.6.2.", "other": {"cve": {"cisaActionDue": null, "cisa... | 348 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* Apache 2.0 - Copyright 2007-2022 - pancake and dso\n class.c rewrite: Adam Pridgen <dso@rice.edu || adam.pridgen@thecoverofnight.com>\n */\n#include <stdio.h>\n#include <string.h>\n#include <stdlib.h>\n#include <stdarg.h>\n#include <r_types.h>\n#include <r_util.h>\n#include <r_bin.h>\n#include <math.h>\n#incl... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [7015], "buggy_code_start_loc": [3629], "filenames": ["shlr/java/class.c"], "fixing_code_end_loc": [7031], "fixing_code_start_loc": [3630], "message": "Buffer Access with Incorrect Length Value in GitHub repository radareorg/radare2 prior to 5.6.2.", "other": {"cve": {"cisaActionDue": null, "cisa... | 348 |
Determine whether the {function_name} code is vulnerable or not. | [
"defmodule Hygeia.CaseContext do\n @moduledoc \"\"\"\n The CaseContext context.\n \"\"\"",
" use Hygeia, :context",
" alias Hygeia.CaseContext.Case\n alias Hygeia.CaseContext.ExternalReference\n alias Hygeia.CaseContext.Hospitalization\n alias Hygeia.CaseContext.Note\n alias Hygeia.CaseContext.Person\n... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1806, 868, 63, 18], "buggy_code_start_loc": [1119, 637, 62, 17], "filenames": ["apps/hygeia/lib/hygeia/case_context.ex", "apps/hygeia/lib/hygeia/statistics_context.ex", "apps/hygeia/mix.exs", "mix.lock"], "fixing_code_end_loc": [1806, 868, 66, 18], "fixing_code_start_loc": [1119, 637, 62, 17], "... | 349 |
Determine whether the {function_name} code is vulnerable or not. | [
"defmodule Hygeia.CaseContext do\n @moduledoc \"\"\"\n The CaseContext context.\n \"\"\"",
" use Hygeia, :context",
" alias Hygeia.CaseContext.Case\n alias Hygeia.CaseContext.ExternalReference\n alias Hygeia.CaseContext.Hospitalization\n alias Hygeia.CaseContext.Note\n alias Hygeia.CaseContext.Person\n... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1806, 868, 63, 18], "buggy_code_start_loc": [1119, 637, 62, 17], "filenames": ["apps/hygeia/lib/hygeia/case_context.ex", "apps/hygeia/lib/hygeia/statistics_context.ex", "apps/hygeia/mix.exs", "mix.lock"], "fixing_code_end_loc": [1806, 868, 66, 18], "fixing_code_start_loc": [1119, 637, 62, 17], "... | 349 |
Determine whether the {function_name} code is vulnerable or not. | [
"defmodule Hygeia.StatisticsContext do\n @moduledoc \"\"\"\n The StatisticsContext context.\n \"\"\"",
" use Hygeia, :context",
" import HygeiaGettext",
" alias Hygeia.CaseContext.Case\n alias Hygeia.OrganisationContext.Affiliation.Kind\n alias Hygeia.StatisticsContext.ActiveCasesPerDayAndOrganisation... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1806, 868, 63, 18], "buggy_code_start_loc": [1119, 637, 62, 17], "filenames": ["apps/hygeia/lib/hygeia/case_context.ex", "apps/hygeia/lib/hygeia/statistics_context.ex", "apps/hygeia/mix.exs", "mix.lock"], "fixing_code_end_loc": [1806, 868, 66, 18], "fixing_code_start_loc": [1119, 637, 62, 17], "... | 349 |
Determine whether the {function_name} code is vulnerable or not. | [
"defmodule Hygeia.StatisticsContext do\n @moduledoc \"\"\"\n The StatisticsContext context.\n \"\"\"",
" use Hygeia, :context",
" import HygeiaGettext",
" alias Hygeia.CaseContext.Case\n alias Hygeia.OrganisationContext.Affiliation.Kind\n alias Hygeia.StatisticsContext.ActiveCasesPerDayAndOrganisation... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1806, 868, 63, 18], "buggy_code_start_loc": [1119, 637, 62, 17], "filenames": ["apps/hygeia/lib/hygeia/case_context.ex", "apps/hygeia/lib/hygeia/statistics_context.ex", "apps/hygeia/mix.exs", "mix.lock"], "fixing_code_end_loc": [1806, 868, 66, 18], "fixing_code_start_loc": [1119, 637, 62, 17], "... | 349 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.