prompt
stringclasses
1 value
completions
listlengths
1
63.8k
labels
listlengths
1
63.8k
source
stringclasses
1 value
other_info
stringlengths
2.06k
101k
index
int64
0
6.83k
Determine whether the {function_name} code is vulnerable or not.
[ "package typesystem", "import (\n\t\"fmt\"", "", "\n\t\"github.com/go-errors/errors\"\n\topenfgapb \"go.buf.build/openfga/go/openfga/api/openfga/v1\"\n)", "const (\n\tSchemaVersion1_0 = \"1.0\"\n\tSchemaVersion1_1 = \"1.1\"\n)", "var (\n\tErrDuplicateTypes = errors.New(\"an authorization model canno...
[ 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 0, 1, 1, 0, 1, 0, 1, 1, 1, 0, 1, 1, 0, 1, 0, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [279, 534], "buggy_code_start_loc": [4, 7], "filenames": ["pkg/typesystem/typesystem.go", "server/test/write_authzmodel.go"], "fixing_code_end_loc": [315, 699], "fixing_code_start_loc": [5, 8], "message": "OpenFGA is an authorization/permission engine. Versions prior to version 0.2.4 are vulnerab...
373
Determine whether the {function_name} code is vulnerable or not.
[ "package typesystem", "import (\n\t\"fmt\"", "\t\"reflect\"", "\n\t\"github.com/go-errors/errors\"\n\topenfgapb \"go.buf.build/openfga/go/openfga/api/openfga/v1\"\n)", "const (\n\tSchemaVersion1_0 = \"1.0\"\n\tSchemaVersion1_1 = \"1.1\"\n)", "var (\n\tErrDuplicateTypes = errors.New(\"an authorizatio...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [279, 534], "buggy_code_start_loc": [4, 7], "filenames": ["pkg/typesystem/typesystem.go", "server/test/write_authzmodel.go"], "fixing_code_end_loc": [315, 699], "fixing_code_start_loc": [5, 8], "message": "OpenFGA is an authorization/permission engine. Versions prior to version 0.2.4 are vulnerab...
373
Determine whether the {function_name} code is vulnerable or not.
[ "package test", "import (\n\t\"context\"\n\t\"fmt\"\n\t\"testing\"\n", "", "\t\"github.com/openfga/openfga/pkg/id\"\n\t\"github.com/openfga/openfga/pkg/logger\"\n\t\"github.com/openfga/openfga/pkg/typesystem\"\n\t\"github.com/openfga/openfga/server/commands\"", "\t\"github.com/openfga/openfga/server/errors\...
[ 1, 1, 0, 1, 0, 1, 1, 1, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [279, 534], "buggy_code_start_loc": [4, 7], "filenames": ["pkg/typesystem/typesystem.go", "server/test/write_authzmodel.go"], "fixing_code_end_loc": [315, 699], "fixing_code_start_loc": [5, 8], "message": "OpenFGA is an authorization/permission engine. Versions prior to version 0.2.4 are vulnerab...
373
Determine whether the {function_name} code is vulnerable or not.
[ "package test", "import (\n\t\"context\"\n\t\"fmt\"\n\t\"testing\"\n", "\t\"github.com/go-errors/errors\"", "\t\"github.com/openfga/openfga/pkg/id\"\n\t\"github.com/openfga/openfga/pkg/logger\"\n\t\"github.com/openfga/openfga/pkg/typesystem\"\n\t\"github.com/openfga/openfga/server/commands\"", "\tserverErro...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [279, 534], "buggy_code_start_loc": [4, 7], "filenames": ["pkg/typesystem/typesystem.go", "server/test/write_authzmodel.go"], "fixing_code_end_loc": [315, 699], "fixing_code_start_loc": [5, 8], "message": "OpenFGA is an authorization/permission engine. Versions prior to version 0.2.4 are vulnerab...
373
Determine whether the {function_name} code is vulnerable or not.
[ "Changelog\n=========", "", "\n2.0 - May 15, 2011\n------------------", "* Start moving codebase to PEP8 compatible coding style.", "* Add support for Python 3.2.", "* Several code cleanups. As a side effect Python versions before 2.6\n are unfortunatley no longer supported. If you use Python 2.5 or olde...
[ 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [2, 227], "buggy_code_start_loc": [2, 35], "filenames": ["CHANGES.txt", "pyrad/packet.py"], "fixing_code_end_loc": [10, 230], "fixing_code_start_loc": [3, 36], "message": "packet.py in pyrad before 2.1 uses weak random numbers to generate RADIUS authenticators and hash passwords, which makes it e...
374
Determine whether the {function_name} code is vulnerable or not.
[ "Changelog\n=========", "\n2.1 - Unreleased\n------------------", "* Use a different random generator to improve the security of generated\n packet ids and authenticators.\n", "\n2.0 - May 15, 2011\n------------------", "* Start moving codebase to PEP8 compatible coding style.", "* Add support for Python...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [2, 227], "buggy_code_start_loc": [2, 35], "filenames": ["CHANGES.txt", "pyrad/packet.py"], "fixing_code_end_loc": [10, 230], "fixing_code_start_loc": [3, 36], "message": "packet.py in pyrad before 2.1 uses weak random numbers to generate RADIUS authenticators and hash passwords, which makes it e...
374
Determine whether the {function_name} code is vulnerable or not.
[ "# packet.py\n#\n# Copyright 2002-2005,2007 Wichert Akkerman <wichert@wiggy.net>\n#\n# A RADIUS packet as defined in RFC 2138", "\nimport struct\nimport random\ntry:\n import hashlib\n md5_constructor = hashlib.md5\nexcept ImportError:\n # BBB for python 2.4\n import md5\n md5_constructor = md5.new...
[ 1, 1, 1, 0, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [2, 227], "buggy_code_start_loc": [2, 35], "filenames": ["CHANGES.txt", "pyrad/packet.py"], "fixing_code_end_loc": [10, 230], "fixing_code_start_loc": [3, 36], "message": "packet.py in pyrad before 2.1 uses weak random numbers to generate RADIUS authenticators and hash passwords, which makes it e...
374
Determine whether the {function_name} code is vulnerable or not.
[ "# packet.py\n#\n# Copyright 2002-2005,2007 Wichert Akkerman <wichert@wiggy.net>\n#\n# A RADIUS packet as defined in RFC 2138", "\nimport struct\nimport random\ntry:\n import hashlib\n md5_constructor = hashlib.md5\nexcept ImportError:\n # BBB for python 2.4\n import md5\n md5_constructor = md5.new...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [2, 227], "buggy_code_start_loc": [2, 35], "filenames": ["CHANGES.txt", "pyrad/packet.py"], "fixing_code_end_loc": [10, 230], "fixing_code_start_loc": [3, 36], "message": "packet.py in pyrad before 2.1 uses weak random numbers to generate RADIUS authenticators and hash passwords, which makes it e...
374
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2008-2011, Intel Corporation.\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the terms and conditions of the GNU General Public License,\n * version 2, as published by the Free Software Foundation.\n *\n * This program is distributed in the hope it wi...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [1290], "buggy_code_start_loc": [286], "filenames": ["net/dcb/dcbnl.c"], "fixing_code_end_loc": [1299], "fixing_code_start_loc": [287], "message": "net/dcb/dcbnl.c in the Linux kernel before 3.8.4 does not initialize certain structures, which allows local users to obtain sensitive information fro...
375
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2008-2011, Intel Corporation.\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the terms and conditions of the GNU General Public License,\n * version 2, as published by the Free Software Foundation.\n *\n * This program is distributed in the hope it wi...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [1290], "buggy_code_start_loc": [286], "filenames": ["net/dcb/dcbnl.c"], "fixing_code_end_loc": [1299], "fixing_code_start_loc": [287], "message": "net/dcb/dcbnl.c in the Linux kernel before 3.8.4 does not initialize certain structures, which allows local users to obtain sensitive information fro...
375
Determine whether the {function_name} code is vulnerable or not.
[ "// SPDX-License-Identifier: GPL-2.0\n#include <linux/types.h>\n#include <linux/tty.h>\n#include <linux/tty_flip.h>\n#include <linux/slab.h>", "#include \"speakup.h\"\n#include \"spk_types.h\"\n#include \"spk_priv.h\"", "struct spk_ldisc_data {\n\tchar buf;\n\tstruct completion completion;\n\tbool buf_free;\n};...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 0, 1, 0, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [60], "buggy_code_start_loc": [51], "filenames": ["drivers/accessibility/speakup/spk_ttyio.c"], "fixing_code_end_loc": [71], "fixing_code_start_loc": [52], "message": "An issue was discovered in drivers/accessibility/speakup/spk_ttyio.c in the Linux kernel through 5.9.9. Local attackers on system...
376
Determine whether the {function_name} code is vulnerable or not.
[ "// SPDX-License-Identifier: GPL-2.0\n#include <linux/types.h>\n#include <linux/tty.h>\n#include <linux/tty_flip.h>\n#include <linux/slab.h>", "#include \"speakup.h\"\n#include \"spk_types.h\"\n#include \"spk_priv.h\"", "struct spk_ldisc_data {\n\tchar buf;\n\tstruct completion completion;\n\tbool buf_free;\n};...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [60], "buggy_code_start_loc": [51], "filenames": ["drivers/accessibility/speakup/spk_ttyio.c"], "fixing_code_end_loc": [71], "fixing_code_start_loc": [52], "message": "An issue was discovered in drivers/accessibility/speakup/spk_ttyio.c in the Linux kernel through 5.9.9. Local attackers on system...
376
Determine whether the {function_name} code is vulnerable or not.
[ "//! Implements the pooling instance allocator.\n//!\n//! The pooling instance allocator maps memory in advance\n//! and allocates instances, memories, tables, and stacks from\n//! a pool of available resources.\n//!\n//! Using the pooling instance allocator can speed up module instantiation\n//! when modules can b...
[ 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [747, 723], "buggy_code_start_loc": [22, 723], "filenames": ["crates/runtime/src/instance/allocator/pooling.rs", "tests/all/pooling_allocator.rs"], "fixing_code_end_loc": [760, 765], "fixing_code_start_loc": [22, 724], "message": "Wasmtime is a standalone runtime for WebAssembly. Prior to version...
377
Determine whether the {function_name} code is vulnerable or not.
[ "//! Implements the pooling instance allocator.\n//!\n//! The pooling instance allocator maps memory in advance\n//! and allocates instances, memories, tables, and stacks from\n//! a pool of available resources.\n//!\n//! Using the pooling instance allocator can speed up module instantiation\n//! when modules can b...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [747, 723], "buggy_code_start_loc": [22, 723], "filenames": ["crates/runtime/src/instance/allocator/pooling.rs", "tests/all/pooling_allocator.rs"], "fixing_code_end_loc": [760, 765], "fixing_code_start_loc": [22, 724], "message": "Wasmtime is a standalone runtime for WebAssembly. Prior to version...
377
Determine whether the {function_name} code is vulnerable or not.
[ "use super::skip_pooling_allocator_tests;\nuse anyhow::Result;\nuse wasmtime::*;", "#[test]\nfn successful_instantiation() -> Result<()> {\n let mut config = Config::new();\n config.allocation_strategy(InstanceAllocationStrategy::Pooling {\n strategy: PoolingAllocationStrategy::NextAvailable,\n ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [747, 723], "buggy_code_start_loc": [22, 723], "filenames": ["crates/runtime/src/instance/allocator/pooling.rs", "tests/all/pooling_allocator.rs"], "fixing_code_end_loc": [760, 765], "fixing_code_start_loc": [22, 724], "message": "Wasmtime is a standalone runtime for WebAssembly. Prior to version...
377
Determine whether the {function_name} code is vulnerable or not.
[ "use super::skip_pooling_allocator_tests;\nuse anyhow::Result;\nuse wasmtime::*;", "#[test]\nfn successful_instantiation() -> Result<()> {\n let mut config = Config::new();\n config.allocation_strategy(InstanceAllocationStrategy::Pooling {\n strategy: PoolingAllocationStrategy::NextAvailable,\n ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [747, 723], "buggy_code_start_loc": [22, 723], "filenames": ["crates/runtime/src/instance/allocator/pooling.rs", "tests/all/pooling_allocator.rs"], "fixing_code_end_loc": [760, 765], "fixing_code_start_loc": [22, 724], "message": "Wasmtime is a standalone runtime for WebAssembly. Prior to version...
377
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * FFV1 decoder\n *\n * Copyright (c) 2003-2013 Michael Niedermayer <michaelni@gmx.at>\n *\n * This file is part of FFmpeg.\n *\n * FFmpeg is free software; you can redistribute it and/or\n * modify it under the terms of the GNU Lesser General Public\n * License as published by the Free Software Foundation; ei...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [604], "buggy_code_start_loc": [582], "filenames": ["libavcodec/ffv1dec.c"], "fixing_code_end_loc": [621], "fixing_code_start_loc": [583], "message": "The read_header function in libavcodec/ffv1dec.c in FFmpeg before 2.1 does not prevent changes to global parameters, which allows remote attackers...
378
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * FFV1 decoder\n *\n * Copyright (c) 2003-2013 Michael Niedermayer <michaelni@gmx.at>\n *\n * This file is part of FFmpeg.\n *\n * FFmpeg is free software; you can redistribute it and/or\n * modify it under the terms of the GNU Lesser General Public\n * License as published by the Free Software Foundation; ei...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [604], "buggy_code_start_loc": [582], "filenames": ["libavcodec/ffv1dec.c"], "fixing_code_end_loc": [621], "fixing_code_start_loc": [583], "message": "The read_header function in libavcodec/ffv1dec.c in FFmpeg before 2.1 does not prevent changes to global parameters, which allows remote attackers...
378
Determine whether the {function_name} code is vulnerable or not.
[ "/* radare - LGPL - Copyright 2010-2016 - nibble, pancake */", "\n#include <stdio.h>\n#include <r_types.h>\n#include <r_util.h>\n#include \"dyldcache.h\"", "static int r_bin_dyldcache_init(struct r_bin_dyldcache_obj_t* bin) {\n\tint len = r_buf_fread_at (bin->b, 0, (ut8*)&bin->hdr, \"16c4i7l\", 1);\n\tif (len ...
[ 0, 1, 1, 1, 1, 0, 1, 1, 0, 1, 0, 1, 0, 1, 0, 1, 1, 1, 1, 1, 0, 1, 0, 1 ]
PreciseBugs
{"buggy_code_end_loc": [237], "buggy_code_start_loc": [1], "filenames": ["libr/bin/format/mach0/dyldcache.c"], "fixing_code_end_loc": [260], "fixing_code_start_loc": [1], "message": "In radare2 prior to 3.1.1, r_bin_dyldcache_extract in libr/bin/format/mach0/dyldcache.c may allow attackers to cause a denial-of-service ...
379
Determine whether the {function_name} code is vulnerable or not.
[ "/* radare - LGPL - Copyright 2010-2018 - nibble, pancake */", "\n#include <stdio.h>\n#include <r_types.h>\n#include <r_util.h>\n#include \"dyldcache.h\"", "static int r_bin_dyldcache_init(struct r_bin_dyldcache_obj_t* bin) {\n\tint len = r_buf_fread_at (bin->b, 0, (ut8*)&bin->hdr, \"16c4i7l\", 1);\n\tif (len ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [237], "buggy_code_start_loc": [1], "filenames": ["libr/bin/format/mach0/dyldcache.c"], "fixing_code_end_loc": [260], "fixing_code_start_loc": [1], "message": "In radare2 prior to 3.1.1, r_bin_dyldcache_extract in libr/bin/format/mach0/dyldcache.c may allow attackers to cause a denial-of-service ...
379
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\nif (!defined('WC_BASE')) define('WC_BASE', dirname(__FILE__));", "include WC_BASE . \"/config/conf.php\";\ninclude WC_BASE . \"/lib/crypto.php\";\ninclude WC_BASE . \"/lib/log.php\";", "session_name('web-cyradm-session');\nsession_start();", "$session_ok = $_SESSION['session_ok'];\n", "$login = $_PO...
[ 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [16], "buggy_code_start_loc": [13], "filenames": ["auth.inc.php"], "fixing_code_end_loc": [16], "fixing_code_start_loc": [13], "message": "A vulnerability, which was classified as critical, has been found in web-cyradm. Affected by this issue is some unknown functionality of the file auth.inc.php...
380
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\nif (!defined('WC_BASE')) define('WC_BASE', dirname(__FILE__));", "include WC_BASE . \"/config/conf.php\";\ninclude WC_BASE . \"/lib/crypto.php\";\ninclude WC_BASE . \"/lib/log.php\";", "session_name('web-cyradm-session');\nsession_start();", "$session_ok = $_SESSION['session_ok'];\n", "$login = adds...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [16], "buggy_code_start_loc": [13], "filenames": ["auth.inc.php"], "fixing_code_end_loc": [16], "fixing_code_start_loc": [13], "message": "A vulnerability, which was classified as critical, has been found in web-cyradm. Affected by this issue is some unknown functionality of the file auth.inc.php...
380
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * pcrypt - Parallel crypto wrapper.\n *\n * Copyright (C) 2009 secunet Security Networks AG\n * Copyright (C) 2009 Steffen Klassert <steffen.klassert@secunet.com>\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the terms and conditions of the GNU General Public Licens...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [473], "buggy_code_start_loc": [256], "filenames": ["crypto/pcrypt.c"], "fixing_code_end_loc": [473], "fixing_code_start_loc": [257], "message": "crypto/pcrypt.c in the Linux kernel before 4.14.13 mishandles freeing instances, allowing a local user able to access the AF_ALG-based AEAD interface (...
381
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * pcrypt - Parallel crypto wrapper.\n *\n * Copyright (C) 2009 secunet Security Networks AG\n * Copyright (C) 2009 Steffen Klassert <steffen.klassert@secunet.com>\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the terms and conditions of the GNU General Public Licens...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [473], "buggy_code_start_loc": [256], "filenames": ["crypto/pcrypt.c"], "fixing_code_end_loc": [473], "fixing_code_start_loc": [257], "message": "crypto/pcrypt.c in the Linux kernel before 4.14.13 mishandles freeing instances, allowing a local user able to access the AF_ALG-based AEAD interface (...
381
Determine whether the {function_name} code is vulnerable or not.
[ "# frozen_string_literal: true", "class EmailChangeRequest < ActiveRecord::Base", " belongs_to :old_email_token, class_name: 'EmailToken'\n belongs_to :new_email_token, class_name: 'EmailToken'", " belongs_to :user\n belongs_to :requested_by, class_name: \"User\", foreign_key: :requested_by_user_id", " ...
[ 1, 1, 0, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [6, 3052], "buggy_code_start_loc": [4, 3052], "filenames": ["app/models/email_change_request.rb", "spec/requests/users_controller_spec.rb"], "fixing_code_end_loc": [6, 3066], "fixing_code_start_loc": [4, 3053], "message": "Discourse is an open-source platform for community discussion. In Discours...
382
Determine whether the {function_name} code is vulnerable or not.
[ "# frozen_string_literal: true", "class EmailChangeRequest < ActiveRecord::Base", " belongs_to :old_email_token, class_name: 'EmailToken', dependent: :destroy\n belongs_to :new_email_token, class_name: 'EmailToken', dependent: :destroy", " belongs_to :user\n belongs_to :requested_by, class_name: \"User\",...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [6, 3052], "buggy_code_start_loc": [4, 3052], "filenames": ["app/models/email_change_request.rb", "spec/requests/users_controller_spec.rb"], "fixing_code_end_loc": [6, 3066], "fixing_code_start_loc": [4, 3053], "message": "Discourse is an open-source platform for community discussion. In Discours...
382
Determine whether the {function_name} code is vulnerable or not.
[ "# frozen_string_literal: true", "require 'rails_helper'\nrequire 'rotp'", "describe UsersController do\n let(:user) { Fabricate(:user) }", " describe \"#full account registration flow\" do\n it \"will correctly handle honeypot and challenge\" do", " get '/session/hp.json'\n expect(response.s...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [6, 3052], "buggy_code_start_loc": [4, 3052], "filenames": ["app/models/email_change_request.rb", "spec/requests/users_controller_spec.rb"], "fixing_code_end_loc": [6, 3066], "fixing_code_start_loc": [4, 3053], "message": "Discourse is an open-source platform for community discussion. In Discours...
382
Determine whether the {function_name} code is vulnerable or not.
[ "# frozen_string_literal: true", "require 'rails_helper'\nrequire 'rotp'", "describe UsersController do\n let(:user) { Fabricate(:user) }", " describe \"#full account registration flow\" do\n it \"will correctly handle honeypot and challenge\" do", " get '/session/hp.json'\n expect(response.s...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [6, 3052], "buggy_code_start_loc": [4, 3052], "filenames": ["app/models/email_change_request.rb", "spec/requests/users_controller_spec.rb"], "fixing_code_end_loc": [6, 3066], "fixing_code_start_loc": [4, 3053], "message": "Discourse is an open-source platform for community discussion. In Discours...
382
Determine whether the {function_name} code is vulnerable or not.
[ "'use strict';", "// Load modules", "const Boom = require('boom');\nconst Hoek = require('hoek');\nconst Cryptiles = require('cryptiles');\nconst Crypto = require('./crypto');\nconst Utils = require('./utils');", "\n// Declare internals", "const internals = {};", "\n// Hawk authentication", "/*\n req:...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [332, 142, 5, 973, 97], "buggy_code_start_loc": [312, 19, 4, 973, 97], "filenames": ["lib/server.js", "lib/utils.js", "package.json", "test/server.js", "test/utils.js"], "fixing_code_end_loc": [340, 159, 5, 1001, 126], "fixing_code_start_loc": [313, 20, 4, 974, 98], "message": "Hawk before 3.1.3 ...
383
Determine whether the {function_name} code is vulnerable or not.
[ "'use strict';", "// Load modules", "const Boom = require('boom');\nconst Hoek = require('hoek');\nconst Cryptiles = require('cryptiles');\nconst Crypto = require('./crypto');\nconst Utils = require('./utils');", "\n// Declare internals", "const internals = {};", "\n// Hawk authentication", "/*\n req:...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [332, 142, 5, 973, 97], "buggy_code_start_loc": [312, 19, 4, 973, 97], "filenames": ["lib/server.js", "lib/utils.js", "package.json", "test/server.js", "test/utils.js"], "fixing_code_end_loc": [340, 159, 5, 1001, 126], "fixing_code_start_loc": [313, 20, 4, 974, 98], "message": "Hawk before 3.1.3 ...
383
Determine whether the {function_name} code is vulnerable or not.
[ "'use strict';", "// Load modules", "const Sntp = require('sntp');\nconst Boom = require('boom');", "\n// Declare internals", "const internals = {};", "\nexports.version = function () {", " return require('../package.json').version;\n};", "", "", "// Extract host and port from request", "// ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 0, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [332, 142, 5, 973, 97], "buggy_code_start_loc": [312, 19, 4, 973, 97], "filenames": ["lib/server.js", "lib/utils.js", "package.json", "test/server.js", "test/utils.js"], "fixing_code_end_loc": [340, 159, 5, 1001, 126], "fixing_code_start_loc": [313, 20, 4, 974, 98], "message": "Hawk before 3.1.3 ...
383
Determine whether the {function_name} code is vulnerable or not.
[ "'use strict';", "// Load modules", "const Sntp = require('sntp');\nconst Boom = require('boom');", "\n// Declare internals", "const internals = {};", "\nexports.version = function () {", " return require('../package.json').version;\n};", "", "exports.limits = {\n maxMatchLength: 4096 ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [332, 142, 5, 973, 97], "buggy_code_start_loc": [312, 19, 4, 973, 97], "filenames": ["lib/server.js", "lib/utils.js", "package.json", "test/server.js", "test/utils.js"], "fixing_code_end_loc": [340, 159, 5, 1001, 126], "fixing_code_start_loc": [313, 20, 4, 974, 98], "message": "Hawk before 3.1.3 ...
383
Determine whether the {function_name} code is vulnerable or not.
[ "{\n \"name\": \"hawk\",\n \"description\": \"HTTP Hawk Authentication Scheme\",", " \"version\": \"4.1.0\",", " \"author\": \"Eran Hammer <eran@hammer.io> (http://hueniverse.com)\",\n \"repository\": \"git://github.com/hueniverse/hawk\",\n \"main\": \"lib/index.js\",\n \"browser\": \"dist/browser.js\",\...
[ 1, 0, 1 ]
PreciseBugs
{"buggy_code_end_loc": [332, 142, 5, 973, 97], "buggy_code_start_loc": [312, 19, 4, 973, 97], "filenames": ["lib/server.js", "lib/utils.js", "package.json", "test/server.js", "test/utils.js"], "fixing_code_end_loc": [340, 159, 5, 1001, 126], "fixing_code_start_loc": [313, 20, 4, 974, 98], "message": "Hawk before 3.1.3 ...
383
Determine whether the {function_name} code is vulnerable or not.
[ "{\n \"name\": \"hawk\",\n \"description\": \"HTTP Hawk Authentication Scheme\",", " \"version\": \"4.1.1\",", " \"author\": \"Eran Hammer <eran@hammer.io> (http://hueniverse.com)\",\n \"repository\": \"git://github.com/hueniverse/hawk\",\n \"main\": \"lib/index.js\",\n \"browser\": \"dist/browser.js\",\...
[ 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [332, 142, 5, 973, 97], "buggy_code_start_loc": [312, 19, 4, 973, 97], "filenames": ["lib/server.js", "lib/utils.js", "package.json", "test/server.js", "test/utils.js"], "fixing_code_end_loc": [340, 159, 5, 1001, 126], "fixing_code_start_loc": [313, 20, 4, 974, 98], "message": "Hawk before 3.1.3 ...
383
Determine whether the {function_name} code is vulnerable or not.
[ "'use strict';", "// Load modules", "const Code = require('code');\nconst Hawk = require('../lib');\nconst Hoek = require('hoek');\nconst Lab = require('lab');", "\n// Declare internals", "const internals = {};", "\n// Test shortcuts", "const lab = exports.lab = Lab.script();\nconst describe = lab.exper...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [332, 142, 5, 973, 97], "buggy_code_start_loc": [312, 19, 4, 973, 97], "filenames": ["lib/server.js", "lib/utils.js", "package.json", "test/server.js", "test/utils.js"], "fixing_code_end_loc": [340, 159, 5, 1001, 126], "fixing_code_start_loc": [313, 20, 4, 974, 98], "message": "Hawk before 3.1.3 ...
383
Determine whether the {function_name} code is vulnerable or not.
[ "'use strict';", "// Load modules", "const Code = require('code');\nconst Hawk = require('../lib');\nconst Hoek = require('hoek');\nconst Lab = require('lab');", "\n// Declare internals", "const internals = {};", "\n// Test shortcuts", "const lab = exports.lab = Lab.script();\nconst describe = lab.exper...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [332, 142, 5, 973, 97], "buggy_code_start_loc": [312, 19, 4, 973, 97], "filenames": ["lib/server.js", "lib/utils.js", "package.json", "test/server.js", "test/utils.js"], "fixing_code_end_loc": [340, 159, 5, 1001, 126], "fixing_code_start_loc": [313, 20, 4, 974, 98], "message": "Hawk before 3.1.3 ...
383
Determine whether the {function_name} code is vulnerable or not.
[ "'use strict';", "// Load modules", "const Code = require('code');\nconst Hawk = require('../lib');\nconst Lab = require('lab');\nconst Package = require('../package.json');", "\n// Declare internals", "const internals = {};", "\n// Test shortcuts", "const lab = exports.lab = Lab.script();\nconst descri...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [332, 142, 5, 973, 97], "buggy_code_start_loc": [312, 19, 4, 973, 97], "filenames": ["lib/server.js", "lib/utils.js", "package.json", "test/server.js", "test/utils.js"], "fixing_code_end_loc": [340, 159, 5, 1001, 126], "fixing_code_start_loc": [313, 20, 4, 974, 98], "message": "Hawk before 3.1.3 ...
383
Determine whether the {function_name} code is vulnerable or not.
[ "'use strict';", "// Load modules", "const Code = require('code');\nconst Hawk = require('../lib');\nconst Lab = require('lab');\nconst Package = require('../package.json');", "\n// Declare internals", "const internals = {};", "\n// Test shortcuts", "const lab = exports.lab = Lab.script();\nconst descri...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [332, 142, 5, 973, 97], "buggy_code_start_loc": [312, 19, 4, 973, 97], "filenames": ["lib/server.js", "lib/utils.js", "package.json", "test/server.js", "test/utils.js"], "fixing_code_end_loc": [340, 159, 5, 1001, 126], "fixing_code_start_loc": [313, 20, 4, 974, 98], "message": "Hawk before 3.1.3 ...
383
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%\n% %\n% %\n% ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [304], "buggy_code_start_loc": [302], "filenames": ["coders/pcl.c"], "fixing_code_end_loc": [304], "fixing_code_start_loc": [302], "message": "A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned long' at coders/pcl.c, when crafted or un...
384
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%\n% %\n% %\n% ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [304], "buggy_code_start_loc": [302], "filenames": ["coders/pcl.c"], "fixing_code_end_loc": [304], "fixing_code_start_loc": [302], "message": "A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned long' at coders/pcl.c, when crafted or un...
384
Determine whether the {function_name} code is vulnerable or not.
[ "\" Test that the methods used for testing work.", "func Test_assert_false()\n call assert_equal(0, assert_false(0))\n call assert_equal(0, assert_false(v:false))\n call assert_equal(0, v:false->assert_false())", " call assert_equal(1, assert_false(123))\n call assert_match(\"Expected 'False' but got 123\"...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [293, 751, 737], "buggy_code_start_loc": [293, 599, 737], "filenames": ["src/testdir/test_assert.vim", "src/testing.c", "src/version.c"], "fixing_code_end_loc": [298, 758, 740], "fixing_code_start_loc": [294, 600, 738], "message": "Use After Free in GitHub repository vim/vim prior to 9.0.0213.", ...
385
Determine whether the {function_name} code is vulnerable or not.
[ "\" Test that the methods used for testing work.", "func Test_assert_false()\n call assert_equal(0, assert_false(0))\n call assert_equal(0, assert_false(v:false))\n call assert_equal(0, v:false->assert_false())", " call assert_equal(1, assert_false(123))\n call assert_match(\"Expected 'False' but got 123\"...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [293, 751, 737], "buggy_code_start_loc": [293, 599, 737], "filenames": ["src/testdir/test_assert.vim", "src/testing.c", "src/version.c"], "fixing_code_end_loc": [298, 758, 740], "fixing_code_start_loc": [294, 600, 738], "message": "Use After Free in GitHub repository vim/vim prior to 9.0.0213.", ...
385
Determine whether the {function_name} code is vulnerable or not.
[ "/* vi:set ts=8 sts=4 sw=4 noet:\n *\n * VIM - Vi IMproved\tby Bram Moolenaar\n *\n * Do \":help uganda\" in Vim to read copying and usage conditions.\n * Do \":help credits\" in Vim to see a list of people who contributed.\n * See README.txt for an overview of the Vim source code.\n */", "/*\n * testing.c: Supp...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 0, 1, 0, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [293, 751, 737], "buggy_code_start_loc": [293, 599, 737], "filenames": ["src/testdir/test_assert.vim", "src/testing.c", "src/version.c"], "fixing_code_end_loc": [298, 758, 740], "fixing_code_start_loc": [294, 600, 738], "message": "Use After Free in GitHub repository vim/vim prior to 9.0.0213.", ...
385
Determine whether the {function_name} code is vulnerable or not.
[ "/* vi:set ts=8 sts=4 sw=4 noet:\n *\n * VIM - Vi IMproved\tby Bram Moolenaar\n *\n * Do \":help uganda\" in Vim to read copying and usage conditions.\n * Do \":help credits\" in Vim to see a list of people who contributed.\n * See README.txt for an overview of the Vim source code.\n */", "/*\n * testing.c: Supp...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [293, 751, 737], "buggy_code_start_loc": [293, 599, 737], "filenames": ["src/testdir/test_assert.vim", "src/testing.c", "src/version.c"], "fixing_code_end_loc": [298, 758, 740], "fixing_code_start_loc": [294, 600, 738], "message": "Use After Free in GitHub repository vim/vim prior to 9.0.0213.", ...
385
Determine whether the {function_name} code is vulnerable or not.
[ "/* vi:set ts=8 sts=4 sw=4 noet:\n *\n * VIM - Vi IMproved\t\tby Bram Moolenaar\n *\n * Do \":help uganda\" in Vim to read copying and usage conditions.\n * Do \":help credits\" in Vim to see a list of people who contributed.\n * See README.txt for an overview of the Vim source code.\n */", "#include \"vim.h\"",...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [293, 751, 737], "buggy_code_start_loc": [293, 599, 737], "filenames": ["src/testdir/test_assert.vim", "src/testing.c", "src/version.c"], "fixing_code_end_loc": [298, 758, 740], "fixing_code_start_loc": [294, 600, 738], "message": "Use After Free in GitHub repository vim/vim prior to 9.0.0213.", ...
385
Determine whether the {function_name} code is vulnerable or not.
[ "/* vi:set ts=8 sts=4 sw=4 noet:\n *\n * VIM - Vi IMproved\t\tby Bram Moolenaar\n *\n * Do \":help uganda\" in Vim to read copying and usage conditions.\n * Do \":help credits\" in Vim to see a list of people who contributed.\n * See README.txt for an overview of the Vim source code.\n */", "#include \"vim.h\"",...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [293, 751, 737], "buggy_code_start_loc": [293, 599, 737], "filenames": ["src/testdir/test_assert.vim", "src/testing.c", "src/version.c"], "fixing_code_end_loc": [298, 758, 740], "fixing_code_start_loc": [294, 600, 738], "message": "Use After Free in GitHub repository vim/vim prior to 9.0.0213.", ...
385
Determine whether the {function_name} code is vulnerable or not.
[ "<?php", "/**\n * This module provides for editing site-specific text files and\n * for uploading site-specific image files.\n *\n * @package OpenEMR\n * @link http://www.open-emr.org\n * @author Rod Roark <rod@sunsetsystems.com>\n * @author Brady Miller <brady.g.miller@gmail.com>\n * @copyright Copy...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [541], "buggy_code_start_loc": [540], "filenames": ["interface/super/manage_site_files.php"], "fixing_code_end_loc": [541], "fixing_code_start_loc": [540], "message": "Cross-site Scripting (XSS) - DOM in GitHub repository openemr/openemr prior to 7.0.0.1.", "other": {"cve": {"cisaActionDue": null...
386
Determine whether the {function_name} code is vulnerable or not.
[ "<?php", "/**\n * This module provides for editing site-specific text files and\n * for uploading site-specific image files.\n *\n * @package OpenEMR\n * @link http://www.open-emr.org\n * @author Rod Roark <rod@sunsetsystems.com>\n * @author Brady Miller <brady.g.miller@gmail.com>\n * @copyright Copy...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [541], "buggy_code_start_loc": [540], "filenames": ["interface/super/manage_site_files.php"], "fixing_code_end_loc": [541], "fixing_code_start_loc": [540], "message": "Cross-site Scripting (XSS) - DOM in GitHub repository openemr/openemr prior to 7.0.0.1.", "other": {"cve": {"cisaActionDue": null...
386
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\n/* Copyright (c) 2002-2007 Rodolphe Quiedeville <rodolphe@quiedeville.org>\n * Copyright (C) 2004-2012 Laurent Destailleur <eldy@users.sourceforge.net>\n * Copyright (C) 2004 Benoit Mortier <benoit.mortier@opensides.be>\n * Copyright (C) 2004 Sebastien Di Cintio <sdicintio@...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [1065, 1563, 1727, 91], "buggy_code_start_loc": [1047, 75, 292, 90], "filenames": ["htdocs/core/class/html.form.class.php", "htdocs/main.inc.php", "htdocs/product/card.php", "htdocs/societe/ajax/company.php"], "fixing_code_end_loc": [1069, 1566, 1727, 91], "fixing_code_start_loc": [1047, 75, 292,...
387
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\n/* Copyright (c) 2002-2007 Rodolphe Quiedeville <rodolphe@quiedeville.org>\n * Copyright (C) 2004-2012 Laurent Destailleur <eldy@users.sourceforge.net>\n * Copyright (C) 2004 Benoit Mortier <benoit.mortier@opensides.be>\n * Copyright (C) 2004 Sebastien Di Cintio <sdicintio@...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [1065, 1563, 1727, 91], "buggy_code_start_loc": [1047, 75, 292, 90], "filenames": ["htdocs/core/class/html.form.class.php", "htdocs/main.inc.php", "htdocs/product/card.php", "htdocs/societe/ajax/company.php"], "fixing_code_end_loc": [1069, 1566, 1727, 91], "fixing_code_start_loc": [1047, 75, 292,...
387
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\n/* Copyright (C) 2002-2007 Rodolphe Quiedeville <rodolphe@quiedeville.org>\n * Copyright (C) 2003 Xavier Dutoit <doli@sydesy.com>\n * Copyright (C) 2004-2015 Laurent Destailleur <eldy@users.sourceforge.net>\n * Copyright (C) 2004 Sebastien Di Cintio <sdicintio@ressource-to...
[ 1, 1, 1, 1, 1, 1, 0, 1, 0, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [1065, 1563, 1727, 91], "buggy_code_start_loc": [1047, 75, 292, 90], "filenames": ["htdocs/core/class/html.form.class.php", "htdocs/main.inc.php", "htdocs/product/card.php", "htdocs/societe/ajax/company.php"], "fixing_code_end_loc": [1069, 1566, 1727, 91], "fixing_code_start_loc": [1047, 75, 292,...
387
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\n/* Copyright (C) 2002-2007 Rodolphe Quiedeville <rodolphe@quiedeville.org>\n * Copyright (C) 2003 Xavier Dutoit <doli@sydesy.com>\n * Copyright (C) 2004-2015 Laurent Destailleur <eldy@users.sourceforge.net>\n * Copyright (C) 2004 Sebastien Di Cintio <sdicintio@ressource-to...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [1065, 1563, 1727, 91], "buggy_code_start_loc": [1047, 75, 292, 90], "filenames": ["htdocs/core/class/html.form.class.php", "htdocs/main.inc.php", "htdocs/product/card.php", "htdocs/societe/ajax/company.php"], "fixing_code_end_loc": [1069, 1566, 1727, 91], "fixing_code_start_loc": [1047, 75, 292,...
387
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\n/* Copyright (C) 2001-2007\tRodolphe Quiedeville\t<rodolphe@quiedeville.org>\n * Copyright (C) 2004-2016\tLaurent Destailleur\t\t<eldy@users.sourceforge.net>\n * Copyright (C) 2005\t\tEric Seigne\t\t\t\t<eric.seigne@ryxeo.com>\n * Copyright (C) 2005-2015\tRegis Houssin\t\t\t<regis.houssin@capnetworks.com>\n...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 0, 0, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 0, 1, 1, 1, 0, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [1065, 1563, 1727, 91], "buggy_code_start_loc": [1047, 75, 292, 90], "filenames": ["htdocs/core/class/html.form.class.php", "htdocs/main.inc.php", "htdocs/product/card.php", "htdocs/societe/ajax/company.php"], "fixing_code_end_loc": [1069, 1566, 1727, 91], "fixing_code_start_loc": [1047, 75, 292,...
387
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\n/* Copyright (C) 2001-2007\tRodolphe Quiedeville\t<rodolphe@quiedeville.org>\n * Copyright (C) 2004-2016\tLaurent Destailleur\t\t<eldy@users.sourceforge.net>\n * Copyright (C) 2005\t\tEric Seigne\t\t\t\t<eric.seigne@ryxeo.com>\n * Copyright (C) 2005-2015\tRegis Houssin\t\t\t<regis.houssin@capnetworks.com>\n...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [1065, 1563, 1727, 91], "buggy_code_start_loc": [1047, 75, 292, 90], "filenames": ["htdocs/core/class/html.form.class.php", "htdocs/main.inc.php", "htdocs/product/card.php", "htdocs/societe/ajax/company.php"], "fixing_code_end_loc": [1069, 1566, 1727, 91], "fixing_code_start_loc": [1047, 75, 292,...
387
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\n/* Copyright (C) 2006 Andre Cianfarani <acianfa@free.fr>\n * Copyright (C) 2005-2012 Regis Houssin <regis.houssin@capnetworks.com>\n * Copyright (C) 2007-2011 Laurent Destailleur <eldy@users.sourceforge.net>\n *\n * This program is free software; you can redistribute it and/or modify\n * it...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [1065, 1563, 1727, 91], "buggy_code_start_loc": [1047, 75, 292, 90], "filenames": ["htdocs/core/class/html.form.class.php", "htdocs/main.inc.php", "htdocs/product/card.php", "htdocs/societe/ajax/company.php"], "fixing_code_end_loc": [1069, 1566, 1727, 91], "fixing_code_start_loc": [1047, 75, 292,...
387
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\n/* Copyright (C) 2006 Andre Cianfarani <acianfa@free.fr>\n * Copyright (C) 2005-2012 Regis Houssin <regis.houssin@capnetworks.com>\n * Copyright (C) 2007-2011 Laurent Destailleur <eldy@users.sourceforge.net>\n *\n * This program is free software; you can redistribute it and/or modify\n * it...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [1065, 1563, 1727, 91], "buggy_code_start_loc": [1047, 75, 292, 90], "filenames": ["htdocs/core/class/html.form.class.php", "htdocs/main.inc.php", "htdocs/product/card.php", "htdocs/societe/ajax/company.php"], "fixing_code_end_loc": [1069, 1566, 1727, 91], "fixing_code_start_loc": [1047, 75, 292,...
387
Determine whether the {function_name} code is vulnerable or not.
[ "# frozen_string_literal: true", "module Api\n class AdminUsersController < ApiBaseController\n before_action :build_admin_user, only: :create\n load_and_authorize_resource class: 'Motor::AdminUser'", " def index\n render json: serialized_user_data(\n @admin_users.preload(:roles).where(del...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [46, 11], "buggy_code_start_loc": [45, 10], "filenames": ["app/controllers/api/admin_users_controller.rb", "app/controllers/application_controller.rb"], "fixing_code_end_loc": [46, 11], "fixing_code_start_loc": [45, 10], "message": "In motor-admin versions 0.0.1 through 0.2.56 are vulnerable to h...
388
Determine whether the {function_name} code is vulnerable or not.
[ "# frozen_string_literal: true", "module Api\n class AdminUsersController < ApiBaseController\n before_action :build_admin_user, only: :create\n load_and_authorize_resource class: 'Motor::AdminUser'", " def index\n render json: serialized_user_data(\n @admin_users.preload(:roles).where(del...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [46, 11], "buggy_code_start_loc": [45, 10], "filenames": ["app/controllers/api/admin_users_controller.rb", "app/controllers/application_controller.rb"], "fixing_code_end_loc": [46, 11], "fixing_code_start_loc": [45, 10], "message": "In motor-admin versions 0.0.1 through 0.2.56 are vulnerable to h...
388
Determine whether the {function_name} code is vulnerable or not.
[ "# frozen_string_literal: true", "class ApplicationController < ActionController::Base\n before_action :maybe_redirect_to_setup\n before_action :maybe_redirect_from_setup", " before_action :authenticate_admin_user!, unless: :setup_path?", " before_action do", " Devise::Mailer.default_url_options = { ...
[ 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [46, 11], "buggy_code_start_loc": [45, 10], "filenames": ["app/controllers/api/admin_users_controller.rb", "app/controllers/application_controller.rb"], "fixing_code_end_loc": [46, 11], "fixing_code_start_loc": [45, 10], "message": "In motor-admin versions 0.0.1 through 0.2.56 are vulnerable to h...
388
Determine whether the {function_name} code is vulnerable or not.
[ "# frozen_string_literal: true", "class ApplicationController < ActionController::Base\n before_action :maybe_redirect_to_setup\n before_action :maybe_redirect_from_setup", " before_action :authenticate_admin_user!, unless: :setup_path?", " before_action do", " Devise::Mailer.default_url_options = { ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [46, 11], "buggy_code_start_loc": [45, 10], "filenames": ["app/controllers/api/admin_users_controller.rb", "app/controllers/application_controller.rb"], "fixing_code_end_loc": [46, 11], "fixing_code_start_loc": [45, 10], "message": "In motor-admin versions 0.0.1 through 0.2.56 are vulnerable to h...
388
Determine whether the {function_name} code is vulnerable or not.
[ "/* vi:set ts=8 sts=4 sw=4 noet:\n *\n * Handling of regular expressions: vim_regcomp(), vim_regexec(), vim_regsub()\n */", "// By default: do not create debugging logs or files related to regular\n// expressions, even when compiling with -DDEBUG.\n// Uncomment the second line to get the regexp debugging.\n#undef...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [1331, 1047, 751], "buggy_code_start_loc": [1312, 9, 751], "filenames": ["src/regexp.c", "src/testdir/test_regexp_latin.vim", "src/version.c"], "fixing_code_end_loc": [1336, 1056, 754], "fixing_code_start_loc": [1313, 9, 752], "message": "vim is vulnerable to Use After Free", "other": {"cve": {"c...
389
Determine whether the {function_name} code is vulnerable or not.
[ "/* vi:set ts=8 sts=4 sw=4 noet:\n *\n * Handling of regular expressions: vim_regcomp(), vim_regexec(), vim_regsub()\n */", "// By default: do not create debugging logs or files related to regular\n// expressions, even when compiling with -DDEBUG.\n// Uncomment the second line to get the regexp debugging.\n#undef...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [1331, 1047, 751], "buggy_code_start_loc": [1312, 9, 751], "filenames": ["src/regexp.c", "src/testdir/test_regexp_latin.vim", "src/version.c"], "fixing_code_end_loc": [1336, 1056, 754], "fixing_code_start_loc": [1313, 9, 752], "message": "vim is vulnerable to Use After Free", "other": {"cve": {"c...
389
Determine whether the {function_name} code is vulnerable or not.
[ "\" Tests for regexp in latin1 encoding", "set encoding=latin1\nscriptencoding latin1", "source check.vim", "func s:equivalence_test()", " let str = \"AАБВГДЕ B C D EИЙКЛ F G H IМНОП J K L M NС OТУФХЦШ P Q R S T UЩЪЫЬ V W X YЭ Z aабвгде b c d eийкл f g h iмноп j k l m nс oтуфхцш p q r s t uщъыь v w x yэя z...
[ 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [1331, 1047, 751], "buggy_code_start_loc": [1312, 9, 751], "filenames": ["src/regexp.c", "src/testdir/test_regexp_latin.vim", "src/version.c"], "fixing_code_end_loc": [1336, 1056, 754], "fixing_code_start_loc": [1313, 9, 752], "message": "vim is vulnerable to Use After Free", "other": {"cve": {"c...
389
Determine whether the {function_name} code is vulnerable or not.
[ "\" Tests for regexp in latin1 encoding", "set encoding=latin1\nscriptencoding latin1", "source check.vim", "func s:equivalence_test()", " let str = \"AÀÁÂÃÄÅ B C D EÈÉÊË F G H IÌÍÎÏ J K L M NÑ OÒÓÔÕÖØ P Q R S T UÙÚÛÜ V W X YÝ Z aàáâãäå b c d eèéêë f g h iìíîï j k l m nñ oòóôõöø p q r s t uùúûü v w x yýÿ z...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [1331, 1047, 751], "buggy_code_start_loc": [1312, 9, 751], "filenames": ["src/regexp.c", "src/testdir/test_regexp_latin.vim", "src/version.c"], "fixing_code_end_loc": [1336, 1056, 754], "fixing_code_start_loc": [1313, 9, 752], "message": "vim is vulnerable to Use After Free", "other": {"cve": {"c...
389
Determine whether the {function_name} code is vulnerable or not.
[ "/* vi:set ts=8 sts=4 sw=4 noet:\n *\n * VIM - Vi IMproved\t\tby Bram Moolenaar\n *\n * Do \":help uganda\" in Vim to read copying and usage conditions.\n * Do \":help credits\" in Vim to see a list of people who contributed.\n * See README.txt for an overview of the Vim source code.\n */", "#include \"vim.h\"",...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [1331, 1047, 751], "buggy_code_start_loc": [1312, 9, 751], "filenames": ["src/regexp.c", "src/testdir/test_regexp_latin.vim", "src/version.c"], "fixing_code_end_loc": [1336, 1056, 754], "fixing_code_start_loc": [1313, 9, 752], "message": "vim is vulnerable to Use After Free", "other": {"cve": {"c...
389
Determine whether the {function_name} code is vulnerable or not.
[ "/* vi:set ts=8 sts=4 sw=4 noet:\n *\n * VIM - Vi IMproved\t\tby Bram Moolenaar\n *\n * Do \":help uganda\" in Vim to read copying and usage conditions.\n * Do \":help credits\" in Vim to see a list of people who contributed.\n * See README.txt for an overview of the Vim source code.\n */", "#include \"vim.h\"",...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [1331, 1047, 751], "buggy_code_start_loc": [1312, 9, 751], "filenames": ["src/regexp.c", "src/testdir/test_regexp_latin.vim", "src/version.c"], "fixing_code_end_loc": [1336, 1056, 754], "fixing_code_start_loc": [1313, 9, 752], "message": "vim is vulnerable to Use After Free", "other": {"cve": {"c...
389
Determine whether the {function_name} code is vulnerable or not.
[ "/*!", " * w-zip v1.0.11", " * (c) 2018-2021 yuda-lyu(semisphere)\n * Released under the MIT License.\n */", "!function(t,r){\"object\"==typeof exports&&\"undefined\"!=typeof module?module.exports=r(require(\"path\"),require(\"fs\"),require(\"archiver\"),require(\"archiver-zip-encrypted\"),require(\"unzipper\...
[ 1, 0, 1, 0, 1 ]
PreciseBugs
{"buggy_code_end_loc": [7, 2, 72, 1464, 359, 1144, 433, 29381, 12, 285, 358, 819], "buggy_code_start_loc": [2, 1, 71, 74, 47, 74, 52, 3, 3, 3, 8, 1], "filenames": ["dist/w-zip.umd.js", "dist/w-zip.umd.js.map", "docs/index.html", "docs/m7z.html", "docs/m7z.mjs.html", "docs/mZip.html", "docs/mZip.mjs.html", "package-lock...
390
Determine whether the {function_name} code is vulnerable or not.
[ "/*!", " * w-zip v1.0.12", " * (c) 2018-2021 yuda-lyu(semisphere)\n * Released under the MIT License.\n */", "!function(t,r){\"object\"==typeof exports&&\"undefined\"!=typeof module?module.exports=r(require(\"path\"),require(\"fs\"),require(\"archiver\"),require(\"archiver-zip-encrypted\"),require(\"unzipper\...
[ 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [7, 2, 72, 1464, 359, 1144, 433, 29381, 12, 285, 358, 819], "buggy_code_start_loc": [2, 1, 71, 74, 47, 74, 52, 3, 3, 3, 8, 1], "filenames": ["dist/w-zip.umd.js", "dist/w-zip.umd.js.map", "docs/index.html", "docs/m7z.html", "docs/m7z.mjs.html", "docs/mZip.html", "docs/mZip.mjs.html", "package-lock...
390
Determine whether the {function_name} code is vulnerable or not.
[ "{\"version\":3,\"file\":\"w-zip.umd.js\",\"sources\":[\"../node_modules/@babel/runtime/helpers/esm/asyncToGenerator.js\",\"../node_modules/@babel/runtime/helpers/esm/typeof.js\",\"../node_modules/regenerator-runtime/runtime.js\",\"../node_modules/lodash/isArray.js\",\"../node_modules/lodash/_freeGlobal.js\",\"../n...
[ 0 ]
PreciseBugs
{"buggy_code_end_loc": [7, 2, 72, 1464, 359, 1144, 433, 29381, 12, 285, 358, 819], "buggy_code_start_loc": [2, 1, 71, 74, 47, 74, 52, 3, 3, 3, 8, 1], "filenames": ["dist/w-zip.umd.js", "dist/w-zip.umd.js.map", "docs/index.html", "docs/m7z.html", "docs/m7z.mjs.html", "docs/mZip.html", "docs/mZip.mjs.html", "package-lock...
390
Determine whether the {function_name} code is vulnerable or not.
[ "{\"version\":3,\"file\":\"w-zip.umd.js\",\"sources\":[\"../node_modules/@babel/runtime/helpers/esm/asyncToGenerator.js\",\"../node_modules/@babel/runtime/helpers/esm/typeof.js\",\"../node_modules/regenerator-runtime/runtime.js\",\"../node_modules/lodash/isArray.js\",\"../node_modules/lodash/_freeGlobal.js\",\"../n...
[ 1 ]
PreciseBugs
{"buggy_code_end_loc": [7, 2, 72, 1464, 359, 1144, 433, 29381, 12, 285, 358, 819], "buggy_code_start_loc": [2, 1, 71, 74, 47, 74, 52, 3, 3, 3, 8, 1], "filenames": ["dist/w-zip.umd.js", "dist/w-zip.umd.js.map", "docs/index.html", "docs/m7z.html", "docs/m7z.mjs.html", "docs/mZip.html", "docs/mZip.mjs.html", "package-lock...
390
Determine whether the {function_name} code is vulnerable or not.
[ "<!DOCTYPE html>\n<html lang=\"en\">\n<head>\n \n <meta charset=\"utf-8\">\n <title>Home - Documentation</title>\n \n \n <script src=\"scripts/prettify/prettify.js\"></script>\n <script src=\"scripts/prettify/lang-css.js\"></script>\n <!--[if lt IE 9]>\n <script src=\"//html5shiv.google...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [7, 2, 72, 1464, 359, 1144, 433, 29381, 12, 285, 358, 819], "buggy_code_start_loc": [2, 1, 71, 74, 47, 74, 52, 3, 3, 3, 8, 1], "filenames": ["dist/w-zip.umd.js", "dist/w-zip.umd.js.map", "docs/index.html", "docs/m7z.html", "docs/m7z.mjs.html", "docs/mZip.html", "docs/mZip.mjs.html", "package-lock...
390
Determine whether the {function_name} code is vulnerable or not.
[ "<!DOCTYPE html>\n<html lang=\"en\">\n<head>\n \n <meta charset=\"utf-8\">\n <title>Home - Documentation</title>\n \n \n <script src=\"scripts/prettify/prettify.js\"></script>\n <script src=\"scripts/prettify/lang-css.js\"></script>\n <!--[if lt IE 9]>\n <script src=\"//html5shiv.google...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [7, 2, 72, 1464, 359, 1144, 433, 29381, 12, 285, 358, 819], "buggy_code_start_loc": [2, 1, 71, 74, 47, 74, 52, 3, 3, 3, 8, 1], "filenames": ["dist/w-zip.umd.js", "dist/w-zip.umd.js.map", "docs/index.html", "docs/m7z.html", "docs/m7z.mjs.html", "docs/mZip.html", "docs/mZip.mjs.html", "package-lock...
390
Determine whether the {function_name} code is vulnerable or not.
[ "<!DOCTYPE html>\n<html lang=\"en\">\n<head>\n \n <meta charset=\"utf-8\">\n <title>m7z - Documentation</title>\n \n \n <script src=\"scripts/prettify/prettify.js\"></script>\n <script src=\"scripts/prettify/lang-css.js\"></script>\n <!--[if lt IE 9]>\n <script src=\"//html5shiv.googlec...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [7, 2, 72, 1464, 359, 1144, 433, 29381, 12, 285, 358, 819], "buggy_code_start_loc": [2, 1, 71, 74, 47, 74, 52, 3, 3, 3, 8, 1], "filenames": ["dist/w-zip.umd.js", "dist/w-zip.umd.js.map", "docs/index.html", "docs/m7z.html", "docs/m7z.mjs.html", "docs/mZip.html", "docs/mZip.mjs.html", "package-lock...
390
Determine whether the {function_name} code is vulnerable or not.
[ "<!DOCTYPE html>\n<html lang=\"en\">\n<head>\n \n <meta charset=\"utf-8\">\n <title>m7z - Documentation</title>\n \n \n <script src=\"scripts/prettify/prettify.js\"></script>\n <script src=\"scripts/prettify/lang-css.js\"></script>\n <!--[if lt IE 9]>\n <script src=\"//html5shiv.googlec...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [7, 2, 72, 1464, 359, 1144, 433, 29381, 12, 285, 358, 819], "buggy_code_start_loc": [2, 1, 71, 74, 47, 74, 52, 3, 3, 3, 8, 1], "filenames": ["dist/w-zip.umd.js", "dist/w-zip.umd.js.map", "docs/index.html", "docs/m7z.html", "docs/m7z.mjs.html", "docs/mZip.html", "docs/mZip.mjs.html", "package-lock...
390
Determine whether the {function_name} code is vulnerable or not.
[ "<!DOCTYPE html>\n<html lang=\"en\">\n<head>\n \n <meta charset=\"utf-8\">\n <title>m7z.mjs - Documentation</title>\n \n \n <script src=\"scripts/prettify/prettify.js\"></script>\n <script src=\"scripts/prettify/lang-css.js\"></script>\n <!--[if lt IE 9]>\n <script src=\"//html5shiv.goo...
[ 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [7, 2, 72, 1464, 359, 1144, 433, 29381, 12, 285, 358, 819], "buggy_code_start_loc": [2, 1, 71, 74, 47, 74, 52, 3, 3, 3, 8, 1], "filenames": ["dist/w-zip.umd.js", "dist/w-zip.umd.js.map", "docs/index.html", "docs/m7z.html", "docs/m7z.mjs.html", "docs/mZip.html", "docs/mZip.mjs.html", "package-lock...
390
Determine whether the {function_name} code is vulnerable or not.
[ "<!DOCTYPE html>\n<html lang=\"en\">\n<head>\n \n <meta charset=\"utf-8\">\n <title>m7z.mjs - Documentation</title>\n \n \n <script src=\"scripts/prettify/prettify.js\"></script>\n <script src=\"scripts/prettify/lang-css.js\"></script>\n <!--[if lt IE 9]>\n <script src=\"//html5shiv.goo...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [7, 2, 72, 1464, 359, 1144, 433, 29381, 12, 285, 358, 819], "buggy_code_start_loc": [2, 1, 71, 74, 47, 74, 52, 3, 3, 3, 8, 1], "filenames": ["dist/w-zip.umd.js", "dist/w-zip.umd.js.map", "docs/index.html", "docs/m7z.html", "docs/m7z.mjs.html", "docs/mZip.html", "docs/mZip.mjs.html", "package-lock...
390
Determine whether the {function_name} code is vulnerable or not.
[ "<!DOCTYPE html>\n<html lang=\"en\">\n<head>\n \n <meta charset=\"utf-8\">\n <title>mZip - Documentation</title>\n \n \n <script src=\"scripts/prettify/prettify.js\"></script>\n <script src=\"scripts/prettify/lang-css.js\"></script>\n <!--[if lt IE 9]>\n <script src=\"//html5shiv.google...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [7, 2, 72, 1464, 359, 1144, 433, 29381, 12, 285, 358, 819], "buggy_code_start_loc": [2, 1, 71, 74, 47, 74, 52, 3, 3, 3, 8, 1], "filenames": ["dist/w-zip.umd.js", "dist/w-zip.umd.js.map", "docs/index.html", "docs/m7z.html", "docs/m7z.mjs.html", "docs/mZip.html", "docs/mZip.mjs.html", "package-lock...
390
Determine whether the {function_name} code is vulnerable or not.
[ "<!DOCTYPE html>\n<html lang=\"en\">\n<head>\n \n <meta charset=\"utf-8\">\n <title>mZip - Documentation</title>\n \n \n <script src=\"scripts/prettify/prettify.js\"></script>\n <script src=\"scripts/prettify/lang-css.js\"></script>\n <!--[if lt IE 9]>\n <script src=\"//html5shiv.google...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [7, 2, 72, 1464, 359, 1144, 433, 29381, 12, 285, 358, 819], "buggy_code_start_loc": [2, 1, 71, 74, 47, 74, 52, 3, 3, 3, 8, 1], "filenames": ["dist/w-zip.umd.js", "dist/w-zip.umd.js.map", "docs/index.html", "docs/m7z.html", "docs/m7z.mjs.html", "docs/mZip.html", "docs/mZip.mjs.html", "package-lock...
390
Determine whether the {function_name} code is vulnerable or not.
[ "<!DOCTYPE html>\n<html lang=\"en\">\n<head>\n \n <meta charset=\"utf-8\">\n <title>mZip.mjs - Documentation</title>\n \n \n <script src=\"scripts/prettify/prettify.js\"></script>\n <script src=\"scripts/prettify/lang-css.js\"></script>\n <!--[if lt IE 9]>\n <script src=\"//html5shiv.go...
[ 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [7, 2, 72, 1464, 359, 1144, 433, 29381, 12, 285, 358, 819], "buggy_code_start_loc": [2, 1, 71, 74, 47, 74, 52, 3, 3, 3, 8, 1], "filenames": ["dist/w-zip.umd.js", "dist/w-zip.umd.js.map", "docs/index.html", "docs/m7z.html", "docs/m7z.mjs.html", "docs/mZip.html", "docs/mZip.mjs.html", "package-lock...
390
Determine whether the {function_name} code is vulnerable or not.
[ "<!DOCTYPE html>\n<html lang=\"en\">\n<head>\n \n <meta charset=\"utf-8\">\n <title>mZip.mjs - Documentation</title>\n \n \n <script src=\"scripts/prettify/prettify.js\"></script>\n <script src=\"scripts/prettify/lang-css.js\"></script>\n <!--[if lt IE 9]>\n <script src=\"//html5shiv.go...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [7, 2, 72, 1464, 359, 1144, 433, 29381, 12, 285, 358, 819], "buggy_code_start_loc": [2, 1, 71, 74, 47, 74, 52, 3, 3, 3, 8, 1], "filenames": ["dist/w-zip.umd.js", "dist/w-zip.umd.js.map", "docs/index.html", "docs/m7z.html", "docs/m7z.mjs.html", "docs/mZip.html", "docs/mZip.mjs.html", "package-lock...
390
Determine whether the {function_name} code is vulnerable or not.
[ "{\n \"name\": \"w-zip\",", " \"version\": \"1.0.9\",", " \"lockfileVersion\": 2,\n \"requires\": true,\n \"packages\": {\n \"\": {\n \"name\": \"w-zip\",", " \"version\": \"1.0.9\",", " \"license\": \"MIT\",\n \"dependencies\": {\n \"archiver\": \"^5.3.0\",\n \"arc...
[ 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1 ]
PreciseBugs
{"buggy_code_end_loc": [7, 2, 72, 1464, 359, 1144, 433, 29381, 12, 285, 358, 819], "buggy_code_start_loc": [2, 1, 71, 74, 47, 74, 52, 3, 3, 3, 8, 1], "filenames": ["dist/w-zip.umd.js", "dist/w-zip.umd.js.map", "docs/index.html", "docs/m7z.html", "docs/m7z.mjs.html", "docs/mZip.html", "docs/mZip.mjs.html", "package-lock...
390
Determine whether the {function_name} code is vulnerable or not.
[ "{\n \"name\": \"w-zip\",", " \"version\": \"1.0.11\",", " \"lockfileVersion\": 2,\n \"requires\": true,\n \"packages\": {\n \"\": {\n \"name\": \"w-zip\",", " \"version\": \"1.0.11\",", " \"license\": \"MIT\",\n \"dependencies\": {\n \"archiver\": \"^5.3.0\",\n \"a...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [7, 2, 72, 1464, 359, 1144, 433, 29381, 12, 285, 358, 819], "buggy_code_start_loc": [2, 1, 71, 74, 47, 74, 52, 3, 3, 3, 8, 1], "filenames": ["dist/w-zip.umd.js", "dist/w-zip.umd.js.map", "docs/index.html", "docs/m7z.html", "docs/m7z.mjs.html", "docs/mZip.html", "docs/mZip.mjs.html", "package-lock...
390
Determine whether the {function_name} code is vulnerable or not.
[ "{\n \"name\": \"w-zip\",", " \"version\": \"1.0.11\",", " \"description\": \"A compression tool with zip and 7z.\",\n \"main\": \"dist/w-zip.umd.js\",\n \"dependencies\": {\n \"archiver\": \"^5.3.0\",\n \"archiver-zip-encrypted\": \"^1.0.10\",\n \"unzipper\": \"^0.10.11\",\n \"lodash\": \"^4.1...
[ 1, 0, 1, 0, 1 ]
PreciseBugs
{"buggy_code_end_loc": [7, 2, 72, 1464, 359, 1144, 433, 29381, 12, 285, 358, 819], "buggy_code_start_loc": [2, 1, 71, 74, 47, 74, 52, 3, 3, 3, 8, 1], "filenames": ["dist/w-zip.umd.js", "dist/w-zip.umd.js.map", "docs/index.html", "docs/m7z.html", "docs/m7z.mjs.html", "docs/mZip.html", "docs/mZip.mjs.html", "package-lock...
390
Determine whether the {function_name} code is vulnerable or not.
[ "{\n \"name\": \"w-zip\",", " \"version\": \"1.0.12\",", " \"description\": \"A compression tool with zip and 7z.\",\n \"main\": \"dist/w-zip.umd.js\",\n \"dependencies\": {\n \"archiver\": \"^5.3.0\",\n \"archiver-zip-encrypted\": \"^1.0.10\",\n \"unzipper\": \"^0.10.11\",\n \"lodash\": \"^4.1...
[ 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [7, 2, 72, 1464, 359, 1144, 433, 29381, 12, 285, 358, 819], "buggy_code_start_loc": [2, 1, 71, 74, 47, 74, 52, 3, 3, 3, 8, 1], "filenames": ["dist/w-zip.umd.js", "dist/w-zip.umd.js.map", "docs/index.html", "docs/m7z.html", "docs/m7z.mjs.html", "docs/mZip.html", "docs/mZip.mjs.html", "package-lock...
390
Determine whether the {function_name} code is vulnerable or not.
[ "import fs from 'fs'\nimport get from 'lodash/get'\nimport execScript from 'wsemi/src/execScript.mjs'", "", "import checkTarget from './checkTarget.mjs'", "\n/**\n * 7z處理\n *\n * @class\n * @returns {Object} 回傳壓縮物件,可使用函數setProg、zipFile、zipFolder、unzip\n * @example\n * import wz from 'w-zip'\n *\n * let fpUnzi...
[ 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [7, 2, 72, 1464, 359, 1144, 433, 29381, 12, 285, 358, 819], "buggy_code_start_loc": [2, 1, 71, 74, 47, 74, 52, 3, 3, 3, 8, 1], "filenames": ["dist/w-zip.umd.js", "dist/w-zip.umd.js.map", "docs/index.html", "docs/m7z.html", "docs/m7z.mjs.html", "docs/mZip.html", "docs/mZip.mjs.html", "package-lock...
390
Determine whether the {function_name} code is vulnerable or not.
[ "import fs from 'fs'\nimport get from 'lodash/get'\nimport execScript from 'wsemi/src/execScript.mjs'", "import getFileName from 'wsemi/src/getFileName.mjs'", "import checkTarget from './checkTarget.mjs'", "\n/**\n * 7z處理\n *\n * @class\n * @returns {Object} 回傳壓縮物件,可使用函數setProg、zipFile、zipFolder、unzip\n * @ex...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [7, 2, 72, 1464, 359, 1144, 433, 29381, 12, 285, 358, 819], "buggy_code_start_loc": [2, 1, 71, 74, 47, 74, 52, 3, 3, 3, 8, 1], "filenames": ["dist/w-zip.umd.js", "dist/w-zip.umd.js.map", "docs/index.html", "docs/m7z.html", "docs/m7z.mjs.html", "docs/mZip.html", "docs/mZip.mjs.html", "package-lock...
390
Determine whether the {function_name} code is vulnerable or not.
[ "import path from 'path'\nimport fs from 'fs'\nimport archiver from 'archiver'\nimport archiverEnc from 'archiver-zip-encrypted'\nimport unzipper from 'unzipper'\nimport get from 'lodash/get'\nimport genPm from 'wsemi/src/genPm.mjs'\nimport pmMap from 'wsemi/src/pmMap.mjs'", "", "import checkTarget from './chec...
[ 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [7, 2, 72, 1464, 359, 1144, 433, 29381, 12, 285, 358, 819], "buggy_code_start_loc": [2, 1, 71, 74, 47, 74, 52, 3, 3, 3, 8, 1], "filenames": ["dist/w-zip.umd.js", "dist/w-zip.umd.js.map", "docs/index.html", "docs/m7z.html", "docs/m7z.mjs.html", "docs/mZip.html", "docs/mZip.mjs.html", "package-lock...
390
Determine whether the {function_name} code is vulnerable or not.
[ "import path from 'path'\nimport fs from 'fs'\nimport archiver from 'archiver'\nimport archiverEnc from 'archiver-zip-encrypted'\nimport unzipper from 'unzipper'\nimport get from 'lodash/get'\nimport genPm from 'wsemi/src/genPm.mjs'\nimport pmMap from 'wsemi/src/pmMap.mjs'", "import getFileName from 'wsemi/src/ge...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [7, 2, 72, 1464, 359, 1144, 433, 29381, 12, 285, 358, 819], "buggy_code_start_loc": [2, 1, 71, 74, 47, 74, 52, 3, 3, 3, 8, 1], "filenames": ["dist/w-zip.umd.js", "dist/w-zip.umd.js.map", "docs/index.html", "docs/m7z.html", "docs/m7z.mjs.html", "docs/mZip.html", "docs/mZip.mjs.html", "package-lock...
390
Determine whether the {function_name} code is vulnerable or not.
[ "PK\u0003\u0004\u0014\u0000\u0001\u0000\b\u0000(0�P��&�P\u0016\u0000\u0000\u0007\u001a\u0000\u0000\u0011\u0000\u0000\u0000folder1/f1-1.xlsx�{t���5�y\u0005�)\u0004�ГC`?�ҽKm\u0013H��l�'��j����Du�3\u0004����P\n��;1(\f�\b8��\u0010p����u�gƘm��<���#7\u0003���O���z��g�\u000b���Z��\t��u3����ܡ5\n�[E\u000f\u00135���\"�qs�g_...
[ 0, 1, 0, 1, 0, 0, 0, 1 ]
PreciseBugs
{"buggy_code_end_loc": [7, 2, 72, 1464, 359, 1144, 433, 29381, 12, 285, 358, 819], "buggy_code_start_loc": [2, 1, 71, 74, 47, 74, 52, 3, 3, 3, 8, 1], "filenames": ["dist/w-zip.umd.js", "dist/w-zip.umd.js.map", "docs/index.html", "docs/m7z.html", "docs/m7z.mjs.html", "docs/mZip.html", "docs/mZip.mjs.html", "package-lock...
390
Determine whether the {function_name} code is vulnerable or not.
[ "PK\u0003\u0004\u0014\u0000\u0001\u0000\b\u0000(0�P��&�P\u0016\u0000\u0000\u0007\u001a\u0000\u0000\u0011\u0000\u0000\u0000folder1/f1-1.xlsx��\b�\"��ӆrq�\u001dq\u0004\u0004��.N�\u0003�K=�#^zP3(b��;�4\u000b�\u0012��\u001b�Э�X\f�ۃ��i8��\u0000��5���ǥPf���J\u0003�B9�\u0010Չ<�d����\u0018^��¶\u000e��g���\u0004��!��?�1i�~o...
[ 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [7, 2, 72, 1464, 359, 1144, 433, 29381, 12, 285, 358, 819], "buggy_code_start_loc": [2, 1, 71, 74, 47, 74, 52, 3, 3, 3, 8, 1], "filenames": ["dist/w-zip.umd.js", "dist/w-zip.umd.js.map", "docs/index.html", "docs/m7z.html", "docs/m7z.mjs.html", "docs/mZip.html", "docs/mZip.mjs.html", "package-lock...
390
Determine whether the {function_name} code is vulnerable or not.
[ "/* radare2 - LGPL - Copyright 2021-2022 - condret */", "#include <r_io.h>", "R_API RIOBank *r_io_bank_new(const char *name) {\n\tr_return_val_if_fail (name, NULL);\n\tRIOBank *bank = R_NEW0 (RIOBank);\n\tif (!bank) {\n\t\treturn NULL;\n\t}\n\tbank->name = strdup (name);\n\tbank->submaps = r_crbtree_new (free);...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [879], "buggy_code_start_loc": [789], "filenames": ["libr/io/io_bank.c"], "fixing_code_end_loc": [879], "fixing_code_start_loc": [789], "message": "NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.8.2.", "other": {"cve": {"cisaActionDue": null, "cisaExploitAdd": null, "c...
391
Determine whether the {function_name} code is vulnerable or not.
[ "/* radare2 - LGPL - Copyright 2021-2022 - condret */", "#include <r_io.h>", "R_API RIOBank *r_io_bank_new(const char *name) {\n\tr_return_val_if_fail (name, NULL);\n\tRIOBank *bank = R_NEW0 (RIOBank);\n\tif (!bank) {\n\t\treturn NULL;\n\t}\n\tbank->name = strdup (name);\n\tbank->submaps = r_crbtree_new (free);...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [879], "buggy_code_start_loc": [789], "filenames": ["libr/io/io_bank.c"], "fixing_code_end_loc": [879], "fixing_code_start_loc": [789], "message": "NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.8.2.", "other": {"cve": {"cisaActionDue": null, "cisaExploitAdd": null, "c...
391
Determine whether the {function_name} code is vulnerable or not.
[ "const graphHelper = require('../../helpers/graph')\nconst safeRegex = require('safe-regex')\nconst _ = require('lodash')\nconst gql = require('graphql')", "/* global WIKI */", "module.exports = {\n Query: {\n async groups () { return {} }\n },\n Mutation: {\n async groups () { return {} }\n },\n Gro...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [175], "buggy_code_start_loc": [175], "filenames": ["server/graph/resolvers/group.js"], "fixing_code_end_loc": [184], "fixing_code_start_loc": [176], "message": "Authentication Bypass Using an Alternate Path or Channel in GitHub repository requarks/wiki prior to 2.5.281. User can get root user pe...
392
Determine whether the {function_name} code is vulnerable or not.
[ "const graphHelper = require('../../helpers/graph')\nconst safeRegex = require('safe-regex')\nconst _ = require('lodash')\nconst gql = require('graphql')", "/* global WIKI */", "module.exports = {\n Query: {\n async groups () { return {} }\n },\n Mutation: {\n async groups () { return {} }\n },\n Gro...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [175], "buggy_code_start_loc": [175], "filenames": ["server/graph/resolvers/group.js"], "fixing_code_end_loc": [184], "fixing_code_start_loc": [176], "message": "Authentication Bypass Using an Alternate Path or Channel in GitHub repository requarks/wiki prior to 2.5.281. User can get root user pe...
392
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\n/* Copyright (C) 2001-2003 Rodolphe Quiedeville <rodolphe@quiedeville.org>\n * Copyright (C) 2002-2003 Jean-Louis Bergamo <jlb@j1b.org>\n * Copyright (C) 2004-2016 Laurent Destailleur <eldy@users.sourceforge.net>\n * Copyright (C) 2013-2015 Raphaël Doursenaud <rdoursenaud@gpcsolutions.f...
[ 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [47], "buggy_code_start_loc": [46], "filenames": ["htdocs/adherents/list.php"], "fixing_code_end_loc": [47], "fixing_code_start_loc": [46], "message": "SQL injection vulnerability in Dolibarr before 7.0.2 allows remote attackers to execute arbitrary SQL commands via vectors involving integer para...
393
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\n/* Copyright (C) 2001-2003 Rodolphe Quiedeville <rodolphe@quiedeville.org>\n * Copyright (C) 2002-2003 Jean-Louis Bergamo <jlb@j1b.org>\n * Copyright (C) 2004-2016 Laurent Destailleur <eldy@users.sourceforge.net>\n * Copyright (C) 2013-2015 Raphaël Doursenaud <rdoursenaud@gpcsolutions.f...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [47], "buggy_code_start_loc": [46], "filenames": ["htdocs/adherents/list.php"], "fixing_code_end_loc": [47], "fixing_code_start_loc": [46], "message": "SQL injection vulnerability in Dolibarr before 7.0.2 allows remote attackers to execute arbitrary SQL commands via vectors involving integer para...
393
Determine whether the {function_name} code is vulnerable or not.
[ "import { body, validationResult } from 'express-validator';\n", "", "// form rules\nexport const registerRules = () => {\n return [\n body('registerForm.username')\n .matches(/^[\\da-zA-Z\\-_.]+$/)\n .withMessage('Username has invalid characters')\n .not()\n .isEmpty()\n .withMessa...
[ 1, 0, 1, 0, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [23, 22], "buggy_code_start_loc": [2, 5], "filenames": ["packages/app/src/server/middlewares/register-form-validator.ts", "packages/app/src/server/routes/apiv3/user-activation.ts"], "fixing_code_end_loc": [24, 23], "fixing_code_start_loc": [3, 6], "message": "Weak Password Requirements in GitHub ...
394
Determine whether the {function_name} code is vulnerable or not.
[ "import { body, validationResult } from 'express-validator';\n", "const PASSOWRD_MINIMUM_NUMBER = 8;", "// form rules\nexport const registerRules = () => {\n return [\n body('registerForm.username')\n .matches(/^[\\da-zA-Z\\-_.]+$/)\n .withMessage('Username has invalid characters')\n .not()\n...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [23, 22], "buggy_code_start_loc": [2, 5], "filenames": ["packages/app/src/server/middlewares/register-form-validator.ts", "packages/app/src/server/routes/apiv3/user-activation.ts"], "fixing_code_end_loc": [24, 23], "fixing_code_start_loc": [3, 6], "message": "Weak Password Requirements in GitHub ...
394
Determine whether the {function_name} code is vulnerable or not.
[ "import path from 'path';\nimport * as express from 'express';\nimport { body, validationResult } from 'express-validator';\nimport ErrorV3 from '../../models/vo/error-apiv3';\n", "", "// validation rules for complete registration form\nexport const completeRegistrationRules = () => {\n return [\n body('use...
[ 1, 0, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [23, 22], "buggy_code_start_loc": [2, 5], "filenames": ["packages/app/src/server/middlewares/register-form-validator.ts", "packages/app/src/server/routes/apiv3/user-activation.ts"], "fixing_code_end_loc": [24, 23], "fixing_code_start_loc": [3, 6], "message": "Weak Password Requirements in GitHub ...
394
Determine whether the {function_name} code is vulnerable or not.
[ "import path from 'path';\nimport * as express from 'express';\nimport { body, validationResult } from 'express-validator';\nimport ErrorV3 from '../../models/vo/error-apiv3';\n", "const PASSOWRD_MINIMUM_NUMBER = 8;", "// validation rules for complete registration form\nexport const completeRegistrationRules = ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [23, 22], "buggy_code_start_loc": [2, 5], "filenames": ["packages/app/src/server/middlewares/register-form-validator.ts", "packages/app/src/server/routes/apiv3/user-activation.ts"], "fixing_code_end_loc": [24, 23], "fixing_code_start_loc": [3, 6], "message": "Weak Password Requirements in GitHub ...
394