prompt stringclasses 1
value | completions listlengths 1 63.8k | labels listlengths 1 63.8k | source stringclasses 1
value | other_info stringlengths 2.06k 101k | index int64 0 6.83k |
|---|---|---|---|---|---|
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n *\tDeclarations of Rose type objects.\n *\n *\tJonathan Naylor G4KLX\t25/8/96\n */",
"#ifndef _ROSE_H\n#define _ROSE_H ",
"#include <linux/rose.h>\n#include <net/sock.h>",
"#define\tROSE_ADDR_LEN\t\t\t5",
"#define\tROSE_MIN_LEN\t\t\t3",
"",
"\n#define\tROSE_GFI\t\t\t0x10\n#define\tROSE_Q_BIT\t\t\t... | [
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [218, 993, 79, 1019, 411], "buggy_code_start_loc": [15, 981, 75, 864, 145], "filenames": ["include/net/rose.h", "net/rose/af_rose.c", "net/rose/rose_loopback.c", "net/rose/rose_route.c", "net/rose/rose_subr.c"], "fixing_code_end_loc": [224, 993, 90, 1025, 434], "fixing_code_start_loc": [16, 981, ... | 579 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n *\tDeclarations of Rose type objects.\n *\n *\tJonathan Naylor G4KLX\t25/8/96\n */",
"#ifndef _ROSE_H\n#define _ROSE_H ",
"#include <linux/rose.h>\n#include <net/sock.h>",
"#define\tROSE_ADDR_LEN\t\t\t5",
"#define\tROSE_MIN_LEN\t\t\t3",
"\n#define\tROSE_CALL_REQ_ADDR_LEN_OFF\t3\n#define\tROSE_CALL_R... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [218, 993, 79, 1019, 411], "buggy_code_start_loc": [15, 981, 75, 864, 145], "filenames": ["include/net/rose.h", "net/rose/af_rose.c", "net/rose/rose_loopback.c", "net/rose/rose_route.c", "net/rose/rose_subr.c"], "fixing_code_end_loc": [224, 993, 90, 1025, 434], "fixing_code_start_loc": [16, 981, ... | 579 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free Software Foundation; either version 2 of the License, or\n * (at your option) any later version.\n *\n * Copyright (C) Jonathan Naylor G4KLX (g4klx@g4klx... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [218, 993, 79, 1019, 411], "buggy_code_start_loc": [15, 981, 75, 864, 145], "filenames": ["include/net/rose.h", "net/rose/af_rose.c", "net/rose/rose_loopback.c", "net/rose/rose_route.c", "net/rose/rose_subr.c"], "fixing_code_end_loc": [224, 993, 90, 1025, 434], "fixing_code_start_loc": [16, 981, ... | 579 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free Software Foundation; either version 2 of the License, or\n * (at your option) any later version.\n *\n * Copyright (C) Jonathan Naylor G4KLX (g4klx@g4klx... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [218, 993, 79, 1019, 411], "buggy_code_start_loc": [15, 981, 75, 864, 145], "filenames": ["include/net/rose.h", "net/rose/af_rose.c", "net/rose/rose_loopback.c", "net/rose/rose_route.c", "net/rose/rose_subr.c"], "fixing_code_end_loc": [224, 993, 90, 1025, 434], "fixing_code_start_loc": [16, 981, ... | 579 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free Software Foundation; either version 2 of the License, or\n * (at your option) any later version.\n *\n * Copyright (C) Jonathan Naylor G4KLX (g4klx@g4klx... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [218, 993, 79, 1019, 411], "buggy_code_start_loc": [15, 981, 75, 864, 145], "filenames": ["include/net/rose.h", "net/rose/af_rose.c", "net/rose/rose_loopback.c", "net/rose/rose_route.c", "net/rose/rose_subr.c"], "fixing_code_end_loc": [224, 993, 90, 1025, 434], "fixing_code_start_loc": [16, 981, ... | 579 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free Software Foundation; either version 2 of the License, or\n * (at your option) any later version.\n *\n * Copyright (C) Jonathan Naylor G4KLX (g4klx@g4klx... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [218, 993, 79, 1019, 411], "buggy_code_start_loc": [15, 981, 75, 864, 145], "filenames": ["include/net/rose.h", "net/rose/af_rose.c", "net/rose/rose_loopback.c", "net/rose/rose_route.c", "net/rose/rose_subr.c"], "fixing_code_end_loc": [224, 993, 90, 1025, 434], "fixing_code_start_loc": [16, 981, ... | 579 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free Software Foundation; either version 2 of the License, or\n * (at your option) any later version.\n *\n * Copyright (C) Jonathan Naylor G4KLX (g4klx@g4klx... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [218, 993, 79, 1019, 411], "buggy_code_start_loc": [15, 981, 75, 864, 145], "filenames": ["include/net/rose.h", "net/rose/af_rose.c", "net/rose/rose_loopback.c", "net/rose/rose_route.c", "net/rose/rose_subr.c"], "fixing_code_end_loc": [224, 993, 90, 1025, 434], "fixing_code_start_loc": [16, 981, ... | 579 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free Software Foundation; either version 2 of the License, or\n * (at your option) any later version.\n *\n * Copyright (C) Jonathan Naylor G4KLX (g4klx@g4klx... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [218, 993, 79, 1019, 411], "buggy_code_start_loc": [15, 981, 75, 864, 145], "filenames": ["include/net/rose.h", "net/rose/af_rose.c", "net/rose/rose_loopback.c", "net/rose/rose_route.c", "net/rose/rose_subr.c"], "fixing_code_end_loc": [224, 993, 90, 1025, 434], "fixing_code_start_loc": [16, 981, ... | 579 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free Software Foundation; either version 2 of the License, or\n * (at your option) any later version.\n *\n * Copyright (C) Jonathan Naylor G4KLX (g4klx@g4klx... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
0,
1,
1,
0,
1,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
1,
1,
1,
0,
1... | PreciseBugs | {"buggy_code_end_loc": [218, 993, 79, 1019, 411], "buggy_code_start_loc": [15, 981, 75, 864, 145], "filenames": ["include/net/rose.h", "net/rose/af_rose.c", "net/rose/rose_loopback.c", "net/rose/rose_route.c", "net/rose/rose_subr.c"], "fixing_code_end_loc": [224, 993, 90, 1025, 434], "fixing_code_start_loc": [16, 981, ... | 579 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free Software Foundation; either version 2 of the License, or\n * (at your option) any later version.\n *\n * Copyright (C) Jonathan Naylor G4KLX (g4klx@g4klx... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [218, 993, 79, 1019, 411], "buggy_code_start_loc": [15, 981, 75, 864, 145], "filenames": ["include/net/rose.h", "net/rose/af_rose.c", "net/rose/rose_loopback.c", "net/rose/rose_route.c", "net/rose/rose_subr.c"], "fixing_code_end_loc": [224, 993, 90, 1025, 434], "fixing_code_start_loc": [16, 981, ... | 579 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"namespace MicroweberPackages\\App\\Http\\Controllers;",
"\nuse Illuminate\\Support\\Facades\\App;\nuse Illuminate\\Support\\Facades\\Request;\nuse MicroweberPackages\\App\\Http\\Middleware\\ApiAuth;\nuse MicroweberPackages\\App\\Http\\Middleware\\SameSiteRefererMiddleware;\nuse MicroweberPackages\\App... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [626], "buggy_code_start_loc": [614], "filenames": ["src/MicroweberPackages/App/Http/Controllers/ApiController.php"], "fixing_code_end_loc": [631], "fixing_code_start_loc": [614], "message": "Reflected XSS on demo.microweber.org/demo/module/ in GitHub repository microweber/microweber prior to 1.2... | 580 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"namespace MicroweberPackages\\App\\Http\\Controllers;",
"\nuse Illuminate\\Support\\Facades\\App;\nuse Illuminate\\Support\\Facades\\Request;\nuse MicroweberPackages\\App\\Http\\Middleware\\ApiAuth;\nuse MicroweberPackages\\App\\Http\\Middleware\\SameSiteRefererMiddleware;\nuse MicroweberPackages\\App... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [626], "buggy_code_start_loc": [614], "filenames": ["src/MicroweberPackages/App/Http/Controllers/ApiController.php"], "fixing_code_end_loc": [631], "fixing_code_start_loc": [614], "message": "Reflected XSS on demo.microweber.org/demo/module/ in GitHub repository microweber/microweber prior to 1.2... | 580 |
Determine whether the {function_name} code is vulnerable or not. | [
"// Copyright Istio Authors\n//\n// Licensed under the Apache License, Version 2.0 (the \"License\");\n// you may not use this file except in compliance with the License.\n// You may obtain a copy of the License at\n//\n// http://www.apache.org/licenses/LICENSE-2.0\n//\n// Unless required by applicable law or a... | [
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [831, 267, 135], "buggy_code_start_loc": [22, 18, 22], "filenames": ["pkg/kube/inject/webhook.go", "pkg/kube/util.go", "pkg/webhooks/validation/server/server.go"], "fixing_code_end_loc": [834, 294, 138], "fixing_code_start_loc": [21, 19, 21], "message": "Istio is an open platform to connect, mana... | 581 |
Determine whether the {function_name} code is vulnerable or not. | [
"// Copyright Istio Authors\n//\n// Licensed under the Apache License, Version 2.0 (the \"License\");\n// you may not use this file except in compliance with the License.\n// You may obtain a copy of the License at\n//\n// http://www.apache.org/licenses/LICENSE-2.0\n//\n// Unless required by applicable law or a... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [831, 267, 135], "buggy_code_start_loc": [22, 18, 22], "filenames": ["pkg/kube/inject/webhook.go", "pkg/kube/util.go", "pkg/webhooks/validation/server/server.go"], "fixing_code_end_loc": [834, 294, 138], "fixing_code_start_loc": [21, 19, 21], "message": "Istio is an open platform to connect, mana... | 581 |
Determine whether the {function_name} code is vulnerable or not. | [
"// Copyright Istio Authors\n//\n// Licensed under the Apache License, Version 2.0 (the \"License\");\n// you may not use this file except in compliance with the License.\n// You may obtain a copy of the License at\n//\n// http://www.apache.org/licenses/LICENSE-2.0\n//\n// Unless required by applicable law or a... | [
1,
1,
1,
0,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0
] | PreciseBugs | {"buggy_code_end_loc": [831, 267, 135], "buggy_code_start_loc": [22, 18, 22], "filenames": ["pkg/kube/inject/webhook.go", "pkg/kube/util.go", "pkg/webhooks/validation/server/server.go"], "fixing_code_end_loc": [834, 294, 138], "fixing_code_start_loc": [21, 19, 21], "message": "Istio is an open platform to connect, mana... | 581 |
Determine whether the {function_name} code is vulnerable or not. | [
"// Copyright Istio Authors\n//\n// Licensed under the Apache License, Version 2.0 (the \"License\");\n// you may not use this file except in compliance with the License.\n// You may obtain a copy of the License at\n//\n// http://www.apache.org/licenses/LICENSE-2.0\n//\n// Unless required by applicable law or a... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [831, 267, 135], "buggy_code_start_loc": [22, 18, 22], "filenames": ["pkg/kube/inject/webhook.go", "pkg/kube/util.go", "pkg/webhooks/validation/server/server.go"], "fixing_code_end_loc": [834, 294, 138], "fixing_code_start_loc": [21, 19, 21], "message": "Istio is an open platform to connect, mana... | 581 |
Determine whether the {function_name} code is vulnerable or not. | [
"// Copyright Istio Authors\n//\n// Licensed under the Apache License, Version 2.0 (the \"License\");\n// you may not use this file except in compliance with the License.\n// You may obtain a copy of the License at\n//\n// http://www.apache.org/licenses/LICENSE-2.0\n//\n// Unless required by applicable law or a... | [
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [831, 267, 135], "buggy_code_start_loc": [22, 18, 22], "filenames": ["pkg/kube/inject/webhook.go", "pkg/kube/util.go", "pkg/webhooks/validation/server/server.go"], "fixing_code_end_loc": [834, 294, 138], "fixing_code_start_loc": [21, 19, 21], "message": "Istio is an open platform to connect, mana... | 581 |
Determine whether the {function_name} code is vulnerable or not. | [
"// Copyright Istio Authors\n//\n// Licensed under the Apache License, Version 2.0 (the \"License\");\n// you may not use this file except in compliance with the License.\n// You may obtain a copy of the License at\n//\n// http://www.apache.org/licenses/LICENSE-2.0\n//\n// Unless required by applicable law or a... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [831, 267, 135], "buggy_code_start_loc": [22, 18, 22], "filenames": ["pkg/kube/inject/webhook.go", "pkg/kube/util.go", "pkg/webhooks/validation/server/server.go"], "fixing_code_end_loc": [834, 294, 138], "fixing_code_start_loc": [21, 19, 21], "message": "Istio is an open platform to connect, mana... | 581 |
Determine whether the {function_name} code is vulnerable or not. | [
"(function() {\n 'use strict';\n exports.version = '3.0.0';",
" var isEqual = require('lodash.isequal');\n var filterd = require('lodash.filter');\n var clonedeep = require('lodash.clonedeep');\n var matches = require('lodash.matches');",
" function RuleEngine(rules, options) {\n thi... | [
1,
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [162], "buggy_code_start_loc": [131], "filenames": ["lib/node-rules.js"], "fixing_code_end_loc": [130], "fixing_code_start_loc": [130], "message": "node-rules including 3.0.0 and prior to 5.0.0 allows injection of arbitrary commands. The argument rules of function \"fromJSON()\" can be controlled... | 582 |
Determine whether the {function_name} code is vulnerable or not. | [
"(function() {\n 'use strict';\n exports.version = '3.0.0';",
" var isEqual = require('lodash.isequal');\n var filterd = require('lodash.filter');\n var clonedeep = require('lodash.clonedeep');\n var matches = require('lodash.matches');",
" function RuleEngine(rules, options) {\n thi... | [
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [162], "buggy_code_start_loc": [131], "filenames": ["lib/node-rules.js"], "fixing_code_end_loc": [130], "fixing_code_start_loc": [130], "message": "node-rules including 3.0.0 and prior to 5.0.0 allows injection of arbitrary commands. The argument rules of function \"fromJSON()\" can be controlled... | 582 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* Copyright 2015 The TensorFlow Authors. All Rights Reserved.",
"Licensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at",
" http://www.apache.org/licenses/LICENSE-2.0",
"Unless required b... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [267], "buggy_code_start_loc": [267], "filenames": ["tensorflow/core/kernels/cwise_ops_common.h"], "fixing_code_end_loc": [273], "fixing_code_start_loc": [268], "message": "TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can cause undefined ... | 583 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* Copyright 2015 The TensorFlow Authors. All Rights Reserved.",
"Licensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at",
" http://www.apache.org/licenses/LICENSE-2.0",
"Unless required b... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [267], "buggy_code_start_loc": [267], "filenames": ["tensorflow/core/kernels/cwise_ops_common.h"], "fixing_code_end_loc": [273], "fixing_code_start_loc": [268], "message": "TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can cause undefined ... | 583 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n\t/*\n\t\tClass: BigTreeAdmin\n\t\t\tThe main class used by the admin for manipulating and retrieving data.\n\t*/",
"\tclass BigTreeAdminBase {",
"\t\tstatic $IRLPrefixes = false;\n\t\tstatic $IRLsCreated = array();\n\t\tstatic $PerPage = 15;",
"\t\t// !View Types\n\t\tstatic $ViewTypes = array(\n\t\t... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [6186], "buggy_code_start_loc": [120], "filenames": ["core/inc/bigtree/admin.php"], "fixing_code_end_loc": [6190], "fixing_code_start_loc": [121], "message": "A Session Fixation issue was discovered in Bigtree before 4.2.24. admin.php accepts a user-provided PHP session ID instead of regenerating... | 584 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n\t/*\n\t\tClass: BigTreeAdmin\n\t\t\tThe main class used by the admin for manipulating and retrieving data.\n\t*/",
"\tclass BigTreeAdminBase {",
"\t\tstatic $IRLPrefixes = false;\n\t\tstatic $IRLsCreated = array();\n\t\tstatic $PerPage = 15;",
"\t\t// !View Types\n\t\tstatic $ViewTypes = array(\n\t\t... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [6186], "buggy_code_start_loc": [120], "filenames": ["core/inc/bigtree/admin.php"], "fixing_code_end_loc": [6190], "fixing_code_start_loc": [121], "message": "A Session Fixation issue was discovered in Bigtree before 4.2.24. admin.php accepts a user-provided PHP session ID instead of regenerating... | 584 |
Determine whether the {function_name} code is vulnerable or not. | [
"(function(window) {\n \"use strict\";",
" window.ls.container.get(\"view\").add({\n selector: \"data-forms-code\",\n controller: function(element, alerts) {\n let lang = element.dataset[\"formsCode\"] || \"json\";\n let div = document.createElement(\"div\");\n let pre = document.createElem... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [62], "buggy_code_start_loc": [61], "filenames": ["public/scripts/views/forms/code.js"], "fixing_code_end_loc": [62], "fixing_code_start_loc": [61], "message": "Cross-site Scripting (XSS) - Stored in GitHub repository appwrite/appwrite prior to 1.0.0-RC1.", "other": {"cve": {"cisaActionDue": null... | 585 |
Determine whether the {function_name} code is vulnerable or not. | [
"(function(window) {\n \"use strict\";",
" window.ls.container.get(\"view\").add({\n selector: \"data-forms-code\",\n controller: function(element, alerts) {\n let lang = element.dataset[\"formsCode\"] || \"json\";\n let div = document.createElement(\"div\");\n let pre = document.createElem... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [62], "buggy_code_start_loc": [61], "filenames": ["public/scripts/views/forms/code.js"], "fixing_code_end_loc": [62], "fixing_code_start_loc": [61], "message": "Cross-site Scripting (XSS) - Stored in GitHub repository appwrite/appwrite prior to 1.0.0-RC1.", "other": {"cve": {"cisaActionDue": null... | 585 |
Determine whether the {function_name} code is vulnerable or not. | [
"//\n// System.Web.HttpForbiddenHandler\n//\n// Authors:\n//\tGonzalo Paniagua Javier (gonzalo@ximian.com)\n//\n// (C) 2002 Ximian, Inc (http://www.ximian.com)\n//",
"//\n// Permission is hereby granted, free of charge, to any person obtaining\n// a copy of this software and associated documentation files (the\n/... | [
1,
1,
1,
0,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [46], "buggy_code_start_loc": [45], "filenames": ["mcs/class/System.Web/System.Web/HttpForbiddenHandler.cs"], "fixing_code_end_loc": [46], "fixing_code_start_loc": [45], "message": "Cross-site scripting (XSS) vulnerability in the ProcessRequest function in mcs/class/System.Web/System.Web/HttpForb... | 586 |
Determine whether the {function_name} code is vulnerable or not. | [
"//\n// System.Web.HttpForbiddenHandler\n//\n// Authors:\n//\tGonzalo Paniagua Javier (gonzalo@ximian.com)\n//\n// (C) 2002 Ximian, Inc (http://www.ximian.com)\n//",
"//\n// Permission is hereby granted, free of charge, to any person obtaining\n// a copy of this software and associated documentation files (the\n/... | [
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [46], "buggy_code_start_loc": [45], "filenames": ["mcs/class/System.Web/System.Web/HttpForbiddenHandler.cs"], "fixing_code_end_loc": [46], "fixing_code_start_loc": [45], "message": "Cross-site scripting (XSS) vulnerability in the ProcessRequest function in mcs/class/System.Web/System.Web/HttpForb... | 586 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/**\n * Copyright 2009-2013 Horde LLC (http://www.horde.org/)\n *\n * See the enclosed file COPYING for license information (LGPL). If you\n * did not receive this file, see http://www.horde.org/licenses/lgpl21.\n *\n * @category Horde\n * @copyright 2009-2013 Horde LLC\n * @license http://www.horde.org/... | [
1,
1,
1,
1,
1,
1,
0,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [76, 631], "buggy_code_start_loc": [64, 29], "filenames": ["framework/Util/lib/Horde/Variables.php", "framework/Util/package.xml"], "fixing_code_end_loc": [78, 634], "fixing_code_start_loc": [64, 29], "message": "The framework/Util/lib/Horde/Variables.php script in the Util library in Horde befor... | 587 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/**\n * Copyright 2009-2013 Horde LLC (http://www.horde.org/)\n *\n * See the enclosed file COPYING for license information (LGPL). If you\n * did not receive this file, see http://www.horde.org/licenses/lgpl21.\n *\n * @category Horde\n * @copyright 2009-2013 Horde LLC\n * @license http://www.horde.org/... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [76, 631], "buggy_code_start_loc": [64, 29], "filenames": ["framework/Util/lib/Horde/Variables.php", "framework/Util/package.xml"], "fixing_code_end_loc": [78, 634], "fixing_code_start_loc": [64, 29], "message": "The framework/Util/lib/Horde/Variables.php script in the Util library in Horde befor... | 587 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<package packagerversion=\"1.9.2\" version=\"2.0\" xmlns=\"http://pear.php.net/dtd/package-2.0\" xmlns:tasks=\"http://pear.php.net/dtd/tasks-1.0\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xsi:schemaLocation=\"http://pear.php.net/dtd/tasks-1.0 http://pear.p... | [
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [76, 631], "buggy_code_start_loc": [64, 29], "filenames": ["framework/Util/lib/Horde/Variables.php", "framework/Util/package.xml"], "fixing_code_end_loc": [78, 634], "fixing_code_start_loc": [64, 29], "message": "The framework/Util/lib/Horde/Variables.php script in the Util library in Horde befor... | 587 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<package packagerversion=\"1.9.2\" version=\"2.0\" xmlns=\"http://pear.php.net/dtd/package-2.0\" xmlns:tasks=\"http://pear.php.net/dtd/tasks-1.0\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xsi:schemaLocation=\"http://pear.php.net/dtd/tasks-1.0 http://pear.p... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [76, 631], "buggy_code_start_loc": [64, 29], "filenames": ["framework/Util/lib/Horde/Variables.php", "framework/Util/package.xml"], "fixing_code_end_loc": [78, 634], "fixing_code_start_loc": [64, 29], "message": "The framework/Util/lib/Horde/Variables.php script in the Util library in Horde befor... | 587 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/**\n * ---------------------------------------------------------------------\n * GLPI Inventory Plugin\n * Copyright (C) 2021 Teclib' and contributors.\n *\n * http://glpi-project.org\n *\n * based on FusionInventory for GLPI\n * Copyright (C) 2010-2021 by the FusionInventory Development Team.\n *\n * ... | [
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1897], "buggy_code_start_loc": [36], "filenames": ["inc/deploypackage.class.php"], "fixing_code_end_loc": [1899], "fixing_code_start_loc": [37], "message": "GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing... | 588 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/**\n * ---------------------------------------------------------------------\n * GLPI Inventory Plugin\n * Copyright (C) 2021 Teclib' and contributors.\n *\n * http://glpi-project.org\n *\n * based on FusionInventory for GLPI\n * Copyright (C) 2010-2021 by the FusionInventory Development Team.\n *\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1897], "buggy_code_start_loc": [36], "filenames": ["inc/deploypackage.class.php"], "fixing_code_end_loc": [1899], "fixing_code_start_loc": [37], "message": "GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing... | 588 |
Determine whether the {function_name} code is vulnerable or not. | [
"//\n// PairManager.m\n// Moonlight\n//\n// Created by Diego Waxemberg on 10/19/14.\n// Copyright (c) 2014 Moonlight Stream. All rights reserved.\n//",
"#import \"PairManager.h\"\n#import \"CryptoManager.h\"\n#import \"Utils.h\"\n#import \"HttpResponse.h\"\n#import \"HttpRequest.h\"\n#import \"ServerInfoRespo... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
0,
1,
1,
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [237], "buggy_code_start_loc": [94], "filenames": ["Limelight/Network/PairManager.m"], "fixing_code_end_loc": [231], "fixing_code_start_loc": [94], "message": "In Moonlight iOS/tvOS before 4.0.1, the pairing process is vulnerable to a man-in-the-middle attack. The bug has been fixed in Moonlight ... | 589 |
Determine whether the {function_name} code is vulnerable or not. | [
"//\n// PairManager.m\n// Moonlight\n//\n// Created by Diego Waxemberg on 10/19/14.\n// Copyright (c) 2014 Moonlight Stream. All rights reserved.\n//",
"#import \"PairManager.h\"\n#import \"CryptoManager.h\"\n#import \"Utils.h\"\n#import \"HttpResponse.h\"\n#import \"HttpRequest.h\"\n#import \"ServerInfoRespo... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [237], "buggy_code_start_loc": [94], "filenames": ["Limelight/Network/PairManager.m"], "fixing_code_end_loc": [231], "fixing_code_start_loc": [94], "message": "In Moonlight iOS/tvOS before 4.0.1, the pairing process is vulnerable to a man-in-the-middle attack. The bug has been fixed in Moonlight ... | 589 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/* Copyright (C) 2013-2014 Olivier Geffroy\t\t<jeff@jeffinfo.com>\n * Copyright (C) 2013-2014 Florian Henry\t\t<florian.henry@open-concept.pro>\n * Copyright (C) 2013-2017 Alexandre Spangaro\t<aspangaro@open-dsi.fr>\n *\n * This program is free software; you can redistribute it and/or modify\n * it under th... | [
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [39, 43, 43, 31, 35, 32], "buggy_code_start_loc": [37, 41, 41, 30, 34, 31], "filenames": ["htdocs/accountancy/customer/card.php", "htdocs/accountancy/expensereport/card.php", "htdocs/accountancy/supplier/card.php", "htdocs/comm/mailing/info.php", "htdocs/compta/paiement/info.php", "htdocs/variant... | 590 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/* Copyright (C) 2013-2014 Olivier Geffroy\t\t<jeff@jeffinfo.com>\n * Copyright (C) 2013-2014 Florian Henry\t\t<florian.henry@open-concept.pro>\n * Copyright (C) 2013-2017 Alexandre Spangaro\t<aspangaro@open-dsi.fr>\n *\n * This program is free software; you can redistribute it and/or modify\n * it under th... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [39, 43, 43, 31, 35, 32], "buggy_code_start_loc": [37, 41, 41, 30, 34, 31], "filenames": ["htdocs/accountancy/customer/card.php", "htdocs/accountancy/expensereport/card.php", "htdocs/accountancy/supplier/card.php", "htdocs/comm/mailing/info.php", "htdocs/compta/paiement/info.php", "htdocs/variant... | 590 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/* Copyright (C) 2004\t\tRodolphe Quiedeville\t<rodolphe@quiedeville.org>\n * Copyright (C) 2005\t\tSimon TOSSER\t\t\t<simon@kornog-computing.com>\n * Copyright (C) 2013-2017\tAlexandre Spangaro\t\t<aspangaro@open-dsi.fr>\n * Copyright (C) 2013-2014\tOlivier Geffroy\t\t\t<jeff@jeffinfo.com>\n * Copyright (C... | [
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [39, 43, 43, 31, 35, 32], "buggy_code_start_loc": [37, 41, 41, 30, 34, 31], "filenames": ["htdocs/accountancy/customer/card.php", "htdocs/accountancy/expensereport/card.php", "htdocs/accountancy/supplier/card.php", "htdocs/comm/mailing/info.php", "htdocs/compta/paiement/info.php", "htdocs/variant... | 590 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/* Copyright (C) 2004\t\tRodolphe Quiedeville\t<rodolphe@quiedeville.org>\n * Copyright (C) 2005\t\tSimon TOSSER\t\t\t<simon@kornog-computing.com>\n * Copyright (C) 2013-2017\tAlexandre Spangaro\t\t<aspangaro@open-dsi.fr>\n * Copyright (C) 2013-2014\tOlivier Geffroy\t\t\t<jeff@jeffinfo.com>\n * Copyright (C... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [39, 43, 43, 31, 35, 32], "buggy_code_start_loc": [37, 41, 41, 30, 34, 31], "filenames": ["htdocs/accountancy/customer/card.php", "htdocs/accountancy/expensereport/card.php", "htdocs/accountancy/supplier/card.php", "htdocs/comm/mailing/info.php", "htdocs/compta/paiement/info.php", "htdocs/variant... | 590 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/* Copyright (C) 2004 Rodolphe Quiedeville <rodolphe@quiedeville.org>\n * Copyright (C) 2005 Simon TOSSER <simon@kornog-computing.com>\n * Copyright (C) 2013-2017 Alexandre Spangaro <aspangaro@open-dsi.fr>\n * Copyright (C) 2013-2014 Olivier Geffroy <jeff@jeffinfo.com>\n * C... | [
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [39, 43, 43, 31, 35, 32], "buggy_code_start_loc": [37, 41, 41, 30, 34, 31], "filenames": ["htdocs/accountancy/customer/card.php", "htdocs/accountancy/expensereport/card.php", "htdocs/accountancy/supplier/card.php", "htdocs/comm/mailing/info.php", "htdocs/compta/paiement/info.php", "htdocs/variant... | 590 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/* Copyright (C) 2004 Rodolphe Quiedeville <rodolphe@quiedeville.org>\n * Copyright (C) 2005 Simon TOSSER <simon@kornog-computing.com>\n * Copyright (C) 2013-2017 Alexandre Spangaro <aspangaro@open-dsi.fr>\n * Copyright (C) 2013-2014 Olivier Geffroy <jeff@jeffinfo.com>\n * C... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [39, 43, 43, 31, 35, 32], "buggy_code_start_loc": [37, 41, 41, 30, 34, 31], "filenames": ["htdocs/accountancy/customer/card.php", "htdocs/accountancy/expensereport/card.php", "htdocs/accountancy/supplier/card.php", "htdocs/comm/mailing/info.php", "htdocs/compta/paiement/info.php", "htdocs/variant... | 590 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/* Copyright (C) 2009 Laurent Destailleur <eldy@users.sourceforge.net>\n * Copyright (C) 2010 Regis Houssin <regis.houssin@inodbox.com>\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free S... | [
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [39, 43, 43, 31, 35, 32], "buggy_code_start_loc": [37, 41, 41, 30, 34, 31], "filenames": ["htdocs/accountancy/customer/card.php", "htdocs/accountancy/expensereport/card.php", "htdocs/accountancy/supplier/card.php", "htdocs/comm/mailing/info.php", "htdocs/compta/paiement/info.php", "htdocs/variant... | 590 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/* Copyright (C) 2009 Laurent Destailleur <eldy@users.sourceforge.net>\n * Copyright (C) 2010 Regis Houssin <regis.houssin@inodbox.com>\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free S... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [39, 43, 43, 31, 35, 32], "buggy_code_start_loc": [37, 41, 41, 30, 34, 31], "filenames": ["htdocs/accountancy/customer/card.php", "htdocs/accountancy/expensereport/card.php", "htdocs/accountancy/supplier/card.php", "htdocs/comm/mailing/info.php", "htdocs/compta/paiement/info.php", "htdocs/variant... | 590 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/* Copyright (C) 2004 Rodolphe Quiedeville <rodolphe@quiedeville.org>\n * Copyright (C) 2004-2009 Laurent Destailleur <eldy@users.sourceforge.net>\n * Copyright (C) 2013\t\tMarcos García\t\t<marcosgdf@gmail.com>\n *\n * This program is free software; you can redistribute it and/or modify\n * it under ... | [
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [39, 43, 43, 31, 35, 32], "buggy_code_start_loc": [37, 41, 41, 30, 34, 31], "filenames": ["htdocs/accountancy/customer/card.php", "htdocs/accountancy/expensereport/card.php", "htdocs/accountancy/supplier/card.php", "htdocs/comm/mailing/info.php", "htdocs/compta/paiement/info.php", "htdocs/variant... | 590 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/* Copyright (C) 2004 Rodolphe Quiedeville <rodolphe@quiedeville.org>\n * Copyright (C) 2004-2009 Laurent Destailleur <eldy@users.sourceforge.net>\n * Copyright (C) 2013\t\tMarcos García\t\t<marcosgdf@gmail.com>\n *\n * This program is free software; you can redistribute it and/or modify\n * it under ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [39, 43, 43, 31, 35, 32], "buggy_code_start_loc": [37, 41, 41, 30, 34, 31], "filenames": ["htdocs/accountancy/customer/card.php", "htdocs/accountancy/expensereport/card.php", "htdocs/accountancy/supplier/card.php", "htdocs/comm/mailing/info.php", "htdocs/compta/paiement/info.php", "htdocs/variant... | 590 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/* Copyright (C) 2016\tMarcos García\t<marcosgdf@gmail.com>\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free Software Foundation; either version 3 of the License, or\n * (at your option) any lat... | [
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [39, 43, 43, 31, 35, 32], "buggy_code_start_loc": [37, 41, 41, 30, 34, 31], "filenames": ["htdocs/accountancy/customer/card.php", "htdocs/accountancy/expensereport/card.php", "htdocs/accountancy/supplier/card.php", "htdocs/comm/mailing/info.php", "htdocs/compta/paiement/info.php", "htdocs/variant... | 590 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/* Copyright (C) 2016\tMarcos García\t<marcosgdf@gmail.com>\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free Software Foundation; either version 3 of the License, or\n * (at your option) any lat... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [39, 43, 43, 31, 35, 32], "buggy_code_start_loc": [37, 41, 41, 30, 34, 31], "filenames": ["htdocs/accountancy/customer/card.php", "htdocs/accountancy/expensereport/card.php", "htdocs/accountancy/supplier/card.php", "htdocs/comm/mailing/info.php", "htdocs/compta/paiement/info.php", "htdocs/variant... | 590 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * fs/inotify_user.c - inotify support for userspace\n *\n * Authors:\n *\tJohn McCutchan\t<ttb@tentacle.dhs.org>\n *\tRobert Love\t<rml@novell.com>\n *\n * Copyright (C) 2005 John McCutchan\n * Copyright 2006 Hewlett-Packard Development Company, L.P.\n *\n * Copyright (C) 2009 Eric Paris <Red Hat Inc>\n * ino... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [754], "buggy_code_start_loc": [754], "filenames": ["fs/notify/inotify/inotify_user.c"], "fixing_code_end_loc": [756], "fixing_code_start_loc": [755], "message": "Memory leak in the inotify_init1 function in fs/notify/inotify/inotify_user.c in the Linux kernel before 2.6.37 allows local users to ... | 591 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * fs/inotify_user.c - inotify support for userspace\n *\n * Authors:\n *\tJohn McCutchan\t<ttb@tentacle.dhs.org>\n *\tRobert Love\t<rml@novell.com>\n *\n * Copyright (C) 2005 John McCutchan\n * Copyright 2006 Hewlett-Packard Development Company, L.P.\n *\n * Copyright (C) 2009 Eric Paris <Red Hat Inc>\n * ino... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [754], "buggy_code_start_loc": [754], "filenames": ["fs/notify/inotify/inotify_user.c"], "fixing_code_end_loc": [756], "fixing_code_start_loc": [755], "message": "Memory leak in the inotify_init1 function in fs/notify/inotify/inotify_user.c in the Linux kernel before 2.6.37 allows local users to ... | 591 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/*\n * searx-stats is free software: you can redistribute it and/or modify\n * it under the terms of the GNU Affero General Public License as published by\n * the Free Software Foundation, either version 3 of the License, or\n * (at your option) any later version.\n *\n * searx-stats is distributed in t... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [178], "buggy_code_start_loc": [97], "filenames": ["cgi/cron.php"], "fixing_code_end_loc": [178], "fixing_code_start_loc": [97], "message": "A vulnerability, which was classified as critical, has been found in pointhi searx_stats. This issue affects some unknown processing of the file cgi/cron.ph... | 592 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/*\n * searx-stats is free software: you can redistribute it and/or modify\n * it under the terms of the GNU Affero General Public License as published by\n * the Free Software Foundation, either version 3 of the License, or\n * (at your option) any later version.\n *\n * searx-stats is distributed in t... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [178], "buggy_code_start_loc": [97], "filenames": ["cgi/cron.php"], "fixing_code_end_loc": [178], "fixing_code_start_loc": [97], "message": "A vulnerability, which was classified as critical, has been found in pointhi searx_stats. This issue affects some unknown processing of the file cgi/cron.ph... | 592 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* Copyright (c) 2002-2006 Sam Trenholme",
" *\n * TERMS\n *\n * Redistribution and use in source and binary forms, with or without\n * modification, are permitted provided that the following conditions\n * are met:\n *\n * 1. Redistributions of source code must retain the above copyright\n * notice, this lis... | [
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [888], "buggy_code_start_loc": [1], "filenames": ["dns/Decompress.c"], "fixing_code_end_loc": [888], "fixing_code_start_loc": [1], "message": "MaraDNS is open-source software that implements the Domain Name System (DNS). In version 3.5.0024 and prior, a remotely exploitable integer underflow vuln... | 593 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* Copyright (c) 2002-2023 Sam Trenholme",
" *\n * TERMS\n *\n * Redistribution and use in source and binary forms, with or without\n * modification, are permitted provided that the following conditions\n * are met:\n *\n * 1. Redistributions of source code must retain the above copyright\n * notice, this lis... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [888], "buggy_code_start_loc": [1], "filenames": ["dns/Decompress.c"], "fixing_code_end_loc": [888], "fixing_code_start_loc": [1], "message": "MaraDNS is open-source software that implements the Domain Name System (DNS). In version 3.5.0024 and prior, a remotely exploitable integer underflow vuln... | 593 |
Determine whether the {function_name} code is vulnerable or not. | [
"#!/usr/bin/perl",
"use strict;\nuse warnings;",
"# ----------------------------------------------------------------------------\n# you: what's the invocation?\n# me: Hail, O Lord Ganesha, destroyer of obsta...\n# you: err hmm not *that* sort of invocation... I meant how does this program\n# get invok... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [156], "buggy_code_start_loc": [156], "filenames": ["src/gl-auth-command"], "fixing_code_end_loc": [158], "fixing_code_start_loc": [157], "message": "Directory traversal vulnerability in the Admin Defined Commands (ADC) feature in gitolite before 1.5.9.1 allows remote attackers to execute arbitra... | 594 |
Determine whether the {function_name} code is vulnerable or not. | [
"#!/usr/bin/perl",
"use strict;\nuse warnings;",
"# ----------------------------------------------------------------------------\n# you: what's the invocation?\n# me: Hail, O Lord Ganesha, destroyer of obsta...\n# you: err hmm not *that* sort of invocation... I meant how does this program\n# get invok... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [156], "buggy_code_start_loc": [156], "filenames": ["src/gl-auth-command"], "fixing_code_end_loc": [158], "fixing_code_start_loc": [157], "message": "Directory traversal vulnerability in the Admin Defined Commands (ADC) feature in gitolite before 1.5.9.1 allows remote attackers to execute arbitra... | 594 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\r\n\r\nclass PiwikHooks {\r\n\t\r\n\t/**\r\n\t * Initialize the Piwik Hook\r\n\t * \r\n\t * @param string $skin\r\n\t * @param string $text\r\n\t * @return bool\r\n\t */\r\n\tpublic static function PiwikSetup ($skin, &$text = '')\r\n\t{\r\n\t\t$text .= PiwikHooks::AddPiwik( $skin->getTitle() );\r\n\t\treturn... | [
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [87], "buggy_code_start_loc": [85], "filenames": ["Piwik.hooks.php"], "fixing_code_end_loc": [87], "fixing_code_start_loc": [85], "message": "A vulnerability classified as problematic has been found in DaSchTour matomo-mediawiki-extension up to 2.4.2. This affects an unknown part of the file Piwi... | 595 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\r\n\r\nclass PiwikHooks {\r\n\t\r\n\t/**\r\n\t * Initialize the Piwik Hook\r\n\t * \r\n\t * @param string $skin\r\n\t * @param string $text\r\n\t * @return bool\r\n\t */\r\n\tpublic static function PiwikSetup ($skin, &$text = '')\r\n\t{\r\n\t\t$text .= PiwikHooks::AddPiwik( $skin->getTitle() );\r\n\t\treturn... | [
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [87], "buggy_code_start_loc": [85], "filenames": ["Piwik.hooks.php"], "fixing_code_end_loc": [87], "fixing_code_start_loc": [85], "message": "A vulnerability classified as problematic has been found in DaSchTour matomo-mediawiki-extension up to 2.4.2. This affects an unknown part of the file Piwi... | 595 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\nnamespace MediaWiki\\Extension\\ScratchOAuth2\\Special;",
"require_once dirname(__DIR__) . \"/common/consts.php\";\nrequire_once dirname(__DIR__) . \"/common/login.php\";\nrequire_once dirname(__DIR__) . \"/common/apps.php\";\nrequire_once dirname(__DIR__) . \"/common/auth.php\";\nrequire_once dirname(__D... | [
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [73], "buggy_code_start_loc": [72], "filenames": ["includes/special/SpecialScratchOAuth2.php"], "fixing_code_end_loc": [73], "fixing_code_start_loc": [72], "message": "A reflected cross-site scripting (XSS) in ScratchOAuth2 before commit 1603f04e44ef67dde6ccffe866d2dca16defb293 allows attackers t... | 596 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\nnamespace MediaWiki\\Extension\\ScratchOAuth2\\Special;",
"require_once dirname(__DIR__) . \"/common/consts.php\";\nrequire_once dirname(__DIR__) . \"/common/login.php\";\nrequire_once dirname(__DIR__) . \"/common/apps.php\";\nrequire_once dirname(__DIR__) . \"/common/auth.php\";\nrequire_once dirname(__D... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [73], "buggy_code_start_loc": [72], "filenames": ["includes/special/SpecialScratchOAuth2.php"], "fixing_code_end_loc": [73], "fixing_code_start_loc": [72], "message": "A reflected cross-site scripting (XSS) in ScratchOAuth2 before commit 1603f04e44ef67dde6ccffe866d2dca16defb293 allows attackers t... | 596 |
Determine whether the {function_name} code is vulnerable or not. | [
"package preprocess",
"import (\n\t\"bytes\"\n\t\"math/big\"\n\t\"sync\"\n\t\"time\"",
"\t\"github.com/ElrondNetwork/elrond-go-core/core\"\n\t\"github.com/ElrondNetwork/elrond-go-core/core/atomic\"\n\t\"github.com/ElrondNetwork/elrond-go-core/core/check\"\n\t\"github.com/ElrondNetwork/elrond-go-core/data\"\n\t\... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [328], "buggy_code_start_loc": [325], "filenames": ["process/block/preprocess/basePreProcess.go"], "fixing_code_end_loc": [333], "fixing_code_start_loc": [326], "message": "Elrond-GO is a go implementation for the Elrond Network protocol. Versions prior to 1.3.50 are subject to a processing issue... | 597 |
Determine whether the {function_name} code is vulnerable or not. | [
"package preprocess",
"import (\n\t\"bytes\"\n\t\"math/big\"\n\t\"sync\"\n\t\"time\"",
"\t\"github.com/ElrondNetwork/elrond-go-core/core\"\n\t\"github.com/ElrondNetwork/elrond-go-core/core/atomic\"\n\t\"github.com/ElrondNetwork/elrond-go-core/core/check\"\n\t\"github.com/ElrondNetwork/elrond-go-core/data\"\n\t\... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [328], "buggy_code_start_loc": [325], "filenames": ["process/block/preprocess/basePreProcess.go"], "fixing_code_end_loc": [333], "fixing_code_start_loc": [326], "message": "Elrond-GO is a go implementation for the Elrond Network protocol. Versions prior to 1.3.50 are subject to a processing issue... | 597 |
Determine whether the {function_name} code is vulnerable or not. | [
"# -*- coding: utf-8 -*-",
"# Copyright 2014 OpenMarket Ltd\n#\n# Licensed under the Apache License, Version 2.0 (the \"License\");\n# you may not use this file except in compliance with the License.\n# You may obtain a copy of the License at\n#\n# http://www.apache.org/licenses/LICENSE-2.0\n#\n# Unless requi... | [
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
0
] | PreciseBugs | {"buggy_code_end_loc": [64, 336], "buggy_code_start_loc": [17, 29], "filenames": ["sydent/http/httpcommon.py", "sydent/http/matrixfederationagent.py"], "fixing_code_end_loc": [166, 342], "fixing_code_start_loc": [18, 29], "message": "Sydent is a reference Matrix identity server. Sydent does not limit the size of reques... | 598 |
Determine whether the {function_name} code is vulnerable or not. | [
"# -*- coding: utf-8 -*-",
"# Copyright 2014 OpenMarket Ltd\n#\n# Licensed under the Apache License, Version 2.0 (the \"License\");\n# you may not use this file except in compliance with the License.\n# You may obtain a copy of the License at\n#\n# http://www.apache.org/licenses/LICENSE-2.0\n#\n# Unless requi... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [64, 336], "buggy_code_start_loc": [17, 29], "filenames": ["sydent/http/httpcommon.py", "sydent/http/matrixfederationagent.py"], "fixing_code_end_loc": [166, 342], "fixing_code_start_loc": [18, 29], "message": "Sydent is a reference Matrix identity server. Sydent does not limit the size of reques... | 598 |
Determine whether the {function_name} code is vulnerable or not. | [
"# -*- coding: utf-8 -*-\n# Copyright 2019 New Vector Ltd\n#\n# Licensed under the Apache License, Version 2.0 (the \"License\");\n# you may not use this file except in compliance with the License.\n# You may obtain a copy of the License at\n#\n# http://www.apache.org/licenses/LICENSE-2.0\n#\n# Unless required ... | [
1,
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
0,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [64, 336], "buggy_code_start_loc": [17, 29], "filenames": ["sydent/http/httpcommon.py", "sydent/http/matrixfederationagent.py"], "fixing_code_end_loc": [166, 342], "fixing_code_start_loc": [18, 29], "message": "Sydent is a reference Matrix identity server. Sydent does not limit the size of reques... | 598 |
Determine whether the {function_name} code is vulnerable or not. | [
"# -*- coding: utf-8 -*-\n# Copyright 2019 New Vector Ltd\n#\n# Licensed under the Apache License, Version 2.0 (the \"License\");\n# you may not use this file except in compliance with the License.\n# You may obtain a copy of the License at\n#\n# http://www.apache.org/licenses/LICENSE-2.0\n#\n# Unless required ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [64, 336], "buggy_code_start_loc": [17, 29], "filenames": ["sydent/http/httpcommon.py", "sydent/http/matrixfederationagent.py"], "fixing_code_end_loc": [166, 342], "fixing_code_start_loc": [18, 29], "message": "Sydent is a reference Matrix identity server. Sydent does not limit the size of reques... | 598 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n$indexOptions = array(\n 'containerId' => 'elements',\n 'data' => array(\n 'data' => $elements,\n 'top_bar' => array(\n 'children' => array(\n array(\n 'children' => array(\n array(\n 'active' ... | [
1,
1,
1,
0,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [87], "buggy_code_start_loc": [86], "filenames": ["app/View/GalaxyElements/ajax/index.ctp"], "fixing_code_end_loc": [87], "fixing_code_start_loc": [86], "message": "app/View/GalaxyElements/ajax/index.ctp in MISP 2.4.147 allows Stored XSS when viewing galaxy cluster elements in JSON format.", "oth... | 599 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n$indexOptions = array(\n 'containerId' => 'elements',\n 'data' => array(\n 'data' => $elements,\n 'top_bar' => array(\n 'children' => array(\n array(\n 'children' => array(\n array(\n 'active' ... | [
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [87], "buggy_code_start_loc": [86], "filenames": ["app/View/GalaxyElements/ajax/index.ctp"], "fixing_code_end_loc": [87], "fixing_code_start_loc": [86], "message": "app/View/GalaxyElements/ajax/index.ctp in MISP 2.4.147 allows Stored XSS when viewing galaxy cluster elements in JSON format.", "oth... | 599 |
Determine whether the {function_name} code is vulnerable or not. | [
"/**\n * FreeRDP: A Remote Desktop Protocol Implementation\n * ZGFX (RDP8) Bulk Data Compression\n *\n * Copyright 2014 Marc-Andre Moreau <marcandre.moreau@gmail.com>\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * Yo... | [
1,
1,
1,
1,
1,
1,
1,
0,
0,
0,
0,
0,
1,
1,
0,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [75, 381], "buggy_code_start_loc": [35, 47], "filenames": ["include/freerdp/codec/zgfx.h", "libfreerdp/codec/zgfx.c"], "fixing_code_end_loc": [59, 420], "fixing_code_start_loc": [34, 47], "message": "FreeRDP prior to version 2.0.0-rc4 contains a Heap-Based Buffer Overflow in function zgfx_decompr... | 600 |
Determine whether the {function_name} code is vulnerable or not. | [
"/**\n * FreeRDP: A Remote Desktop Protocol Implementation\n * ZGFX (RDP8) Bulk Data Compression\n *\n * Copyright 2014 Marc-Andre Moreau <marcandre.moreau@gmail.com>\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * Yo... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [75, 381], "buggy_code_start_loc": [35, 47], "filenames": ["include/freerdp/codec/zgfx.h", "libfreerdp/codec/zgfx.c"], "fixing_code_end_loc": [59, 420], "fixing_code_start_loc": [34, 47], "message": "FreeRDP prior to version 2.0.0-rc4 contains a Heap-Based Buffer Overflow in function zgfx_decompr... | 600 |
Determine whether the {function_name} code is vulnerable or not. | [
"/**\n * FreeRDP: A Remote Desktop Protocol Implementation\n * ZGFX (RDP8) Bulk Data Compression\n *\n * Copyright 2014 Marc-Andre Moreau <marcandre.moreau@gmail.com>\n * Copyright 2017 Armin Novak <armin.novak@thincast.com>\n * Copyright 2017 Thincast Technologies GmbH\n *\n * Licensed under the Apache License, Ve... | [
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
0,
1,
1,
1,
0,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [75, 381], "buggy_code_start_loc": [35, 47], "filenames": ["include/freerdp/codec/zgfx.h", "libfreerdp/codec/zgfx.c"], "fixing_code_end_loc": [59, 420], "fixing_code_start_loc": [34, 47], "message": "FreeRDP prior to version 2.0.0-rc4 contains a Heap-Based Buffer Overflow in function zgfx_decompr... | 600 |
Determine whether the {function_name} code is vulnerable or not. | [
"/**\n * FreeRDP: A Remote Desktop Protocol Implementation\n * ZGFX (RDP8) Bulk Data Compression\n *\n * Copyright 2014 Marc-Andre Moreau <marcandre.moreau@gmail.com>\n * Copyright 2017 Armin Novak <armin.novak@thincast.com>\n * Copyright 2017 Thincast Technologies GmbH\n *\n * Licensed under the Apache License, Ve... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [75, 381], "buggy_code_start_loc": [35, 47], "filenames": ["include/freerdp/codec/zgfx.h", "libfreerdp/codec/zgfx.c"], "fixing_code_end_loc": [59, 420], "fixing_code_start_loc": [34, 47], "message": "FreeRDP prior to version 2.0.0-rc4 contains a Heap-Based Buffer Overflow in function zgfx_decompr... | 600 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright 2017-present Facebook, Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by app... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [90], "buggy_code_start_loc": [89], "filenames": ["wangle/bootstrap/AcceptRoutingHandler-inl.h"], "fixing_code_end_loc": [92], "fixing_code_start_loc": [89], "message": "Wangle's AcceptRoutingHandler incorrectly casts a socket when accepting a TLS 1.3 connection, leading to a potential denial of ... | 601 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright 2017-present Facebook, Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by app... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [90], "buggy_code_start_loc": [89], "filenames": ["wangle/bootstrap/AcceptRoutingHandler-inl.h"], "fixing_code_end_loc": [92], "fixing_code_start_loc": [89], "message": "Wangle's AcceptRoutingHandler incorrectly casts a socket when accepting a TLS 1.3 connection, leading to a potential denial of ... | 601 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"namespace App\\Controllers;",
"use Illuminate\\Http\\Request;\nuse App\\Libs\\Controller;\nuse Illuminate\\Support\\Facades\\Storage;\nuse \\Illuminate\\Http\\File;",
"class FileManagerController extends Controller{\n ",
"",
"",
" /**\n * Display a listing of the resource.\n *\n ... | [
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [227], "buggy_code_start_loc": [11], "filenames": ["app/Controllers/FileManagerController.php"], "fixing_code_end_loc": [236], "fixing_code_start_loc": [12], "message": "An unrestricted file upload issue in HorizontCMS through 1.0.0-beta allows an authenticated remote attacker (with access to the... | 602 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"namespace App\\Controllers;",
"use Illuminate\\Http\\Request;\nuse App\\Libs\\Controller;\nuse Illuminate\\Support\\Facades\\Storage;\nuse \\Illuminate\\Http\\File;",
"class FileManagerController extends Controller{\n ",
"\n private function validationRegex(){\n return '/^.*\\.('.implode... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [227], "buggy_code_start_loc": [11], "filenames": ["app/Controllers/FileManagerController.php"], "fixing_code_end_loc": [236], "fixing_code_start_loc": [12], "message": "An unrestricted file upload issue in HorizontCMS through 1.0.0-beta allows an authenticated remote attacker (with access to the... | 602 |
Determine whether the {function_name} code is vulnerable or not. | [
"use crate::{wasm_frame_vec_t, wasm_instance_t, wasm_name_t, wasm_store_t};\nuse once_cell::unsync::OnceCell;\nuse wasmtime::{Trap, TrapCode};",
"#[repr(C)]\n#[derive(Clone)]\npub struct wasm_trap_t {\n pub(crate) trap: Trap,\n}",
"wasmtime_c_api_macros::declare_ref!(wasm_trap_t);",
"impl wasm_trap_t {\n ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [96], "buggy_code_start_loc": [95], "filenames": ["crates/c-api/src/trap.rs"], "fixing_code_end_loc": [96], "fixing_code_start_loc": [95], "message": "Wasmtime is a standalone runtime for WebAssembly. Prior to version 2.0.2, there is a bug in Wasmtime's C API implementation where the definition o... | 603 |
Determine whether the {function_name} code is vulnerable or not. | [
"use crate::{wasm_frame_vec_t, wasm_instance_t, wasm_name_t, wasm_store_t};\nuse once_cell::unsync::OnceCell;\nuse wasmtime::{Trap, TrapCode};",
"#[repr(C)]\n#[derive(Clone)]\npub struct wasm_trap_t {\n pub(crate) trap: Trap,\n}",
"wasmtime_c_api_macros::declare_ref!(wasm_trap_t);",
"impl wasm_trap_t {\n ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [96], "buggy_code_start_loc": [95], "filenames": ["crates/c-api/src/trap.rs"], "fixing_code_end_loc": [96], "fixing_code_start_loc": [95], "message": "Wasmtime is a standalone runtime for WebAssembly. Prior to version 2.0.2, there is a bug in Wasmtime's C API implementation where the definition o... | 603 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * linux/kernel/fork.c\n *\n * Copyright (C) 1991, 1992 Linus Torvalds\n */",
"/*\n * 'fork.c' contains the help-routines for the 'fork' system call\n * (see also entry.S and others).\n * Fork is rather simple, once you get the hang of it, but the memory\n * management can be a bitch. See 'mm/memory.c': ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1349], "buggy_code_start_loc": [1340], "filenames": ["kernel/fork.c"], "fixing_code_end_loc": [1362], "fixing_code_start_loc": [1341], "message": "include/linux/init_task.h in the Linux kernel before 2.6.35 does not prevent signals with a process group ID of zero from reaching the swapper proces... | 604 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * linux/kernel/fork.c\n *\n * Copyright (C) 1991, 1992 Linus Torvalds\n */",
"/*\n * 'fork.c' contains the help-routines for the 'fork' system call\n * (see also entry.S and others).\n * Fork is rather simple, once you get the hang of it, but the memory\n * management can be a bitch. See 'mm/memory.c': ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1349], "buggy_code_start_loc": [1340], "filenames": ["kernel/fork.c"], "fixing_code_end_loc": [1362], "fixing_code_start_loc": [1341], "message": "include/linux/init_task.h in the Linux kernel before 2.6.35 does not prevent signals with a process group ID of zero from reaching the swapper proces... | 604 |
Determine whether the {function_name} code is vulnerable or not. | [
"// SPDX-License-Identifier: GPL-2.0-or-later\n/*\n * net/key/af_key.c\tAn implementation of PF_KEYv2 sockets.\n *\n * Authors:\tMaxim Giryaev\t<gem@asplinux.ru>\n *\t\tDavid S. Miller\t<davem@redhat.com>\n *\t\tAlexey Kuznetsov <kuznet@ms2.inr.ac.ru>\n *\t\tKunihiro Ishiguro <kunihiro@ipinfusion.com>\n *\t\tKazuno... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1702], "buggy_code_start_loc": [1699], "filenames": ["net/key/af_key.c"], "fixing_code_end_loc": [1706], "fixing_code_start_loc": [1700], "message": "A race condition was found in the Linux kernel's IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occ... | 605 |
Determine whether the {function_name} code is vulnerable or not. | [
"// SPDX-License-Identifier: GPL-2.0-or-later\n/*\n * net/key/af_key.c\tAn implementation of PF_KEYv2 sockets.\n *\n * Authors:\tMaxim Giryaev\t<gem@asplinux.ru>\n *\t\tDavid S. Miller\t<davem@redhat.com>\n *\t\tAlexey Kuznetsov <kuznet@ms2.inr.ac.ru>\n *\t\tKunihiro Ishiguro <kunihiro@ipinfusion.com>\n *\t\tKazuno... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1702], "buggy_code_start_loc": [1699], "filenames": ["net/key/af_key.c"], "fixing_code_end_loc": [1706], "fixing_code_start_loc": [1700], "message": "A race condition was found in the Linux kernel's IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occ... | 605 |
Determine whether the {function_name} code is vulnerable or not. | [
"/**\n * This file is part of the Goobi viewer - a content presentation and management application for digitized objects.\n *\n * Visit these websites for more information.\n * - http://www.intranda.com\n * - http://digiverso.com\n *\n * This program is free software; you can redistribute it and/o... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [188], "buggy_code_start_loc": [188], "filenames": ["goobi-viewer-core/src/main/java/io/goobi/viewer/controller/DataFileTools.java"], "fixing_code_end_loc": [191], "fixing_code_start_loc": [189], "message": "In Goobi Viewer Core before version 4.8.3, a path traversal vulnerability allows for remo... | 606 |
Determine whether the {function_name} code is vulnerable or not. | [
"/**\n * This file is part of the Goobi viewer - a content presentation and management application for digitized objects.\n *\n * Visit these websites for more information.\n * - http://www.intranda.com\n * - http://digiverso.com\n *\n * This program is free software; you can redistribute it and/o... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [188], "buggy_code_start_loc": [188], "filenames": ["goobi-viewer-core/src/main/java/io/goobi/viewer/controller/DataFileTools.java"], "fixing_code_end_loc": [191], "fixing_code_start_loc": [189], "message": "In Goobi Viewer Core before version 4.8.3, a path traversal vulnerability allows for remo... | 606 |
Determine whether the {function_name} code is vulnerable or not. | [
"package golf",
"import (",
"",
"\t\"encoding/hex\"",
"\t\"math/rand\"\n\t\"time\"",
")",
"const chars = \"abcdefghijklmnopqrstuvwxyz0123456789\"",
"func randomBytes(strlen int) []byte {",
"\trand.Seed(time.Now().UTC().UnixNano())\n\tresult := make([]byte, strlen)\n\tfor i := 0; i < strlen; i++ {\n\... | [
1,
1,
0,
1,
0,
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [18], "buggy_code_start_loc": [3], "filenames": ["xsrf.go"], "fixing_code_end_loc": [19], "fixing_code_start_loc": [4], "message": "CSRF tokens are generated using math/rand, which is not a cryptographically secure random number generator, allowing an attacker to predict values and bypass CSRF pr... | 607 |
Determine whether the {function_name} code is vulnerable or not. | [
"package golf",
"import (",
"\t\"crypto/rand\"",
"\t\"encoding/hex\"",
"",
")",
"const chars = \"abcdefghijklmnopqrstuvwxyz0123456789\"",
"func randomBytes(strlen int) []byte {",
"\tb := make([]byte, strlen)\n\t_, err := rand.Read(b)\n\tif err != nil {\n\t\t// panic on failure since this indicates a... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [18], "buggy_code_start_loc": [3], "filenames": ["xsrf.go"], "fixing_code_end_loc": [19], "fixing_code_start_loc": [4], "message": "CSRF tokens are generated using math/rand, which is not a cryptographically secure random number generator, allowing an attacker to predict values and bypass CSRF pr... | 607 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/*Copyright (c) 2013, Stéphane Petitcolas\nThis file is part of CookieViz",
"CookieViz is free software: you can redistribute it and/or modify\nit under the terms of the GNU General Public License as published by\nthe Free Software Foundation, either version 3 of the License, or\n(at your option) any late... | [
1,
1,
1,
1,
1,
1,
0,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [24, 32], "buggy_code_start_loc": [23, 26], "filenames": ["cookieviz/info.php", "cookieviz/json.php"], "fixing_code_end_loc": [31, 36], "fixing_code_start_loc": [23, 26], "message": "SQL injection vulnerability in info.php in French National Commission on Informatics and Liberty (aka CNIL) Cookie... | 608 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/*Copyright (c) 2013, Stéphane Petitcolas\nThis file is part of CookieViz",
"CookieViz is free software: you can redistribute it and/or modify\nit under the terms of the GNU General Public License as published by\nthe Free Software Foundation, either version 3 of the License, or\n(at your option) any late... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [24, 32], "buggy_code_start_loc": [23, 26], "filenames": ["cookieviz/info.php", "cookieviz/json.php"], "fixing_code_end_loc": [31, 36], "fixing_code_start_loc": [23, 26], "message": "SQL injection vulnerability in info.php in French National Commission on Informatics and Liberty (aka CNIL) Cookie... | 608 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/*Copyright (c) 2013, Stéphane Petitcolas\nThis file is part of CookieViz",
"CookieViz is free software: you can redistribute it and/or modify\nit under the terms of the GNU General Public License as published by\nthe Free Software Foundation, either version 3 of the License, or\n(at your option) any late... | [
1,
1,
1,
1,
1,
1,
0,
1,
1,
0,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [24, 32], "buggy_code_start_loc": [23, 26], "filenames": ["cookieviz/info.php", "cookieviz/json.php"], "fixing_code_end_loc": [31, 36], "fixing_code_start_loc": [23, 26], "message": "SQL injection vulnerability in info.php in French National Commission on Informatics and Liberty (aka CNIL) Cookie... | 608 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/*Copyright (c) 2013, Stéphane Petitcolas\nThis file is part of CookieViz",
"CookieViz is free software: you can redistribute it and/or modify\nit under the terms of the GNU General Public License as published by\nthe Free Software Foundation, either version 3 of the License, or\n(at your option) any late... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [24, 32], "buggy_code_start_loc": [23, 26], "filenames": ["cookieviz/info.php", "cookieviz/json.php"], "fixing_code_end_loc": [31, 36], "fixing_code_start_loc": [23, 26], "message": "SQL injection vulnerability in info.php in French National Commission on Informatics and Liberty (aka CNIL) Cookie... | 608 |
Determine whether the {function_name} code is vulnerable or not. | [
"// SPDX-License-Identifier: GPL-2.0\n// Copyright (c) 2011-2018, The Linux Foundation. All rights reserved.\n// Copyright (c) 2018, Linaro Limited",
"#include <linux/completion.h>\n#include <linux/device.h>\n#include <linux/dma-buf.h>\n#include <linux/dma-mapping.h>\n#include <linux/idr.h>\n#include <linux/list.... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [529], "buggy_code_start_loc": [529], "filenames": ["drivers/misc/fastrpc.c"], "fixing_code_end_loc": [531], "fixing_code_start_loc": [530], "message": "A memory leak in the fastrpc_dma_buf_attach() function in drivers/misc/fastrpc.c in the Linux kernel before 5.3.9 allows attackers to cause a de... | 609 |
Determine whether the {function_name} code is vulnerable or not. | [
"// SPDX-License-Identifier: GPL-2.0\n// Copyright (c) 2011-2018, The Linux Foundation. All rights reserved.\n// Copyright (c) 2018, Linaro Limited",
"#include <linux/completion.h>\n#include <linux/device.h>\n#include <linux/dma-buf.h>\n#include <linux/dma-mapping.h>\n#include <linux/idr.h>\n#include <linux/list.... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [529], "buggy_code_start_loc": [529], "filenames": ["drivers/misc/fastrpc.c"], "fixing_code_end_loc": [531], "fixing_code_start_loc": [530], "message": "A memory leak in the fastrpc_dma_buf_attach() function in drivers/misc/fastrpc.c in the Linux kernel before 5.3.9 allows attackers to cause a de... | 609 |
Determine whether the {function_name} code is vulnerable or not. | [
"# -*- coding: utf-8 -*-",
"# This file is part of the Calibre-Web (https://github.com/janeczku/calibre-web)\n# Copyright (C) 2012-2019 cervinko, idalin, SiphonSquirrel, ouzklcn, akushsky,\n# OzzieIsaacs, bodybybuddha, jkrehm, matthazinski, janeczku\n#\n# This program is free softw... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [741], "buggy_code_start_loc": [737], "filenames": ["cps/helper.py"], "fixing_code_end_loc": [741], "fixing_code_start_loc": [737], "message": "Server-Side Request Forgery (SSRF) in GitHub repository janeczku/calibre-web prior to 0.6.17.", "other": {"cve": {"cisaActionDue": null, "cisaExploitAdd"... | 610 |
Determine whether the {function_name} code is vulnerable or not. | [
"# -*- coding: utf-8 -*-",
"# This file is part of the Calibre-Web (https://github.com/janeczku/calibre-web)\n# Copyright (C) 2012-2019 cervinko, idalin, SiphonSquirrel, ouzklcn, akushsky,\n# OzzieIsaacs, bodybybuddha, jkrehm, matthazinski, janeczku\n#\n# This program is free softw... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [741], "buggy_code_start_loc": [737], "filenames": ["cps/helper.py"], "fixing_code_end_loc": [741], "fixing_code_start_loc": [737], "message": "Server-Side Request Forgery (SSRF) in GitHub repository janeczku/calibre-web prior to 0.6.17.", "other": {"cve": {"cisaActionDue": null, "cisaExploitAdd"... | 610 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Configuration for w3m\n * This is sample. ./configure will generate config.h for you.\n */",
"#ifndef _CONFIGURED_\n#define _CONFIGURED_",
"/* User Configuration */",
"/* \n If you define USE_DICT, you can use dictionary look-up function\n in w3m. See README.dict for detail.\n*/\n#define USE_DICT... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [212, 145, 8771, 154, 5974, 1332], "buggy_code_start_loc": [212, 145, 8770, 153, 5974, 1332], "filenames": ["config.h.dist", "config.h.in", "configure", "configure.ac", "main.c", "rc.c"], "fixing_code_end_loc": [214, 147, 8771, 154, 5982, 1338], "fixing_code_start_loc": [213, 146, 8770, 153, 5975... | 611 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Configuration for w3m\n * This is sample. ./configure will generate config.h for you.\n */",
"#ifndef _CONFIGURED_\n#define _CONFIGURED_",
"/* User Configuration */",
"/* \n If you define USE_DICT, you can use dictionary look-up function\n in w3m. See README.dict for detail.\n*/\n#define USE_DICT... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [212, 145, 8771, 154, 5974, 1332], "buggy_code_start_loc": [212, 145, 8770, 153, 5974, 1332], "filenames": ["config.h.dist", "config.h.in", "configure", "configure.ac", "main.c", "rc.c"], "fixing_code_end_loc": [214, 147, 8771, 154, 5982, 1338], "fixing_code_start_loc": [213, 146, 8770, 153, 5975... | 611 |
Determine whether the {function_name} code is vulnerable or not. | [
"#ifndef CONFIG_H_SEEN\n#define CONFIG_H_SEEN\n/*\n * Configuration for w3m\n */\n#define JA 0\n#define EN 1",
"/* Name of package */\n#undef PACKAGE",
"#define HELP_FILE \"w3mhelp.html\"\n#define HELP_CGI \"w3mhelp\"\n#define W3MCONFIG \"w3mconfig\"\n#define IMGDISPLAY \"w3mimgdisplay\"\n#define XF... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [212, 145, 8771, 154, 5974, 1332], "buggy_code_start_loc": [212, 145, 8770, 153, 5974, 1332], "filenames": ["config.h.dist", "config.h.in", "configure", "configure.ac", "main.c", "rc.c"], "fixing_code_end_loc": [214, 147, 8771, 154, 5982, 1338], "fixing_code_start_loc": [213, 146, 8770, 153, 5975... | 611 |
Determine whether the {function_name} code is vulnerable or not. | [
"#ifndef CONFIG_H_SEEN\n#define CONFIG_H_SEEN\n/*\n * Configuration for w3m\n */\n#define JA 0\n#define EN 1",
"/* Name of package */\n#undef PACKAGE",
"#define HELP_FILE \"w3mhelp.html\"\n#define HELP_CGI \"w3mhelp\"\n#define W3MCONFIG \"w3mconfig\"\n#define IMGDISPLAY \"w3mimgdisplay\"\n#define XF... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [212, 145, 8771, 154, 5974, 1332], "buggy_code_start_loc": [212, 145, 8770, 153, 5974, 1332], "filenames": ["config.h.dist", "config.h.in", "configure", "configure.ac", "main.c", "rc.c"], "fixing_code_end_loc": [214, 147, 8771, 154, 5982, 1338], "fixing_code_start_loc": [213, 146, 8770, 153, 5975... | 611 |
Determine whether the {function_name} code is vulnerable or not. | [
"#! /bin/sh\n# Guess values for system-dependent variables and create Makefiles.\n# Generated by GNU Autoconf 2.67 for w3m 0.5.3.\n#\n# Report bugs to <satodai@w3m.jp>.\n#\n#\n# Copyright (C) 1992, 1993, 1994, 1995, 1996, 1998, 1999, 2000, 2001,\n# 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010 Free Software\... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [212, 145, 8771, 154, 5974, 1332], "buggy_code_start_loc": [212, 145, 8770, 153, 5974, 1332], "filenames": ["config.h.dist", "config.h.in", "configure", "configure.ac", "main.c", "rc.c"], "fixing_code_end_loc": [214, 147, 8771, 154, 5982, 1338], "fixing_code_start_loc": [213, 146, 8770, 153, 5975... | 611 |
Determine whether the {function_name} code is vulnerable or not. | [
"#! /bin/sh\n# Guess values for system-dependent variables and create Makefiles.\n# Generated by GNU Autoconf 2.67 for w3m 0.5.3.\n#\n# Report bugs to <satodai@w3m.jp>.\n#\n#\n# Copyright (C) 1992, 1993, 1994, 1995, 1996, 1998, 1999, 2000, 2001,\n# 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010 Free Software\... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [212, 145, 8771, 154, 5974, 1332], "buggy_code_start_loc": [212, 145, 8770, 153, 5974, 1332], "filenames": ["config.h.dist", "config.h.in", "configure", "configure.ac", "main.c", "rc.c"], "fixing_code_end_loc": [214, 147, 8771, 154, 5982, 1338], "fixing_code_start_loc": [213, 146, 8770, 153, 5975... | 611 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.