prompt stringclasses 1
value | completions listlengths 1 63.8k | labels listlengths 1 63.8k | source stringclasses 1
value | other_info stringlengths 2.06k 101k | index int64 0 6.83k |
|---|---|---|---|---|---|
Determine whether the {function_name} code is vulnerable or not. | [
"/* ----------------------------------------------------------------------------\n * ATMEL Microcontroller Software Support\n * ----------------------------------------------------------------------------\n * Copyright (c) 2015, Atmel Corporation\n *\n * All rights reserved.\n *\n * Redistribution and use i... | [
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
0,
0,
0,
1,
0,
1,
0,
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
0,
1,
0,
1,
0,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [142, 45], "buggy_code_start_loc": [34, 43], "filenames": ["driver/secure.c", "include/secure.h"], "fixing_code_end_loc": [147, 42], "fixing_code_start_loc": [35, 42], "message": "AT91bootstrap before 3.9.2 does not properly wipe encryption and authentication keys from memory before passing contr... | 629 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* ----------------------------------------------------------------------------\n * ATMEL Microcontroller Software Support\n * ----------------------------------------------------------------------------\n * Copyright (c) 2015, Atmel Corporation\n *\n * All rights reserved.\n *\n * Redistribution and use i... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [142, 45], "buggy_code_start_loc": [34, 43], "filenames": ["driver/secure.c", "include/secure.h"], "fixing_code_end_loc": [147, 42], "fixing_code_start_loc": [35, 42], "message": "AT91bootstrap before 3.9.2 does not properly wipe encryption and authentication keys from memory before passing contr... | 629 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* ----------------------------------------------------------------------------\n * ATMEL Microcontroller Software Support\n * ----------------------------------------------------------------------------\n * Copyright (c) 2015, Atmel Corporation\n *\n * All rights reserved.\n *\n * Redistribution and use i... | [
1,
1,
1,
1,
0,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [142, 45], "buggy_code_start_loc": [34, 43], "filenames": ["driver/secure.c", "include/secure.h"], "fixing_code_end_loc": [147, 42], "fixing_code_start_loc": [35, 42], "message": "AT91bootstrap before 3.9.2 does not properly wipe encryption and authentication keys from memory before passing contr... | 629 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* ----------------------------------------------------------------------------\n * ATMEL Microcontroller Software Support\n * ----------------------------------------------------------------------------\n * Copyright (c) 2015, Atmel Corporation\n *\n * All rights reserved.\n *\n * Redistribution and use i... | [
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [142, 45], "buggy_code_start_loc": [34, 43], "filenames": ["driver/secure.c", "include/secure.h"], "fixing_code_end_loc": [147, 42], "fixing_code_start_loc": [35, 42], "message": "AT91bootstrap before 3.9.2 does not properly wipe encryption and authentication keys from memory before passing contr... | 629 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\nCopyright (c) 2013, David C Horton",
"Permission is hereby granted, free of charge, to any person obtaining a copy\nof this software and associated documentation files (the \"Software\"), to deal\nin the Software without restriction, including without limitation the rights\nto use, copy, modify, merge, publi... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [277], "buggy_code_start_loc": [276], "filenames": ["src/controller.cpp"], "fixing_code_end_loc": [277], "fixing_code_start_loc": [276], "message": "An issue was discovered in drachtio-server before 0.8.20. It allows remote attackers to cause a denial of service (daemon crash) via a long message ... | 630 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\nCopyright (c) 2013, David C Horton",
"Permission is hereby granted, free of charge, to any person obtaining a copy\nof this software and associated documentation files (the \"Software\"), to deal\nin the Software without restriction, including without limitation the rights\nto use, copy, modify, merge, publi... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [277], "buggy_code_start_loc": [276], "filenames": ["src/controller.cpp"], "fixing_code_end_loc": [277], "fixing_code_start_loc": [276], "message": "An issue was discovered in drachtio-server before 0.8.20. It allows remote attackers to cause a denial of service (daemon crash) via a long message ... | 630 |
Determine whether the {function_name} code is vulnerable or not. | [
"@using SmartStore.Web.Models.Boards;",
"",
"@model ForumPostModel\n@Html.Raw(\"<a name=\\\"{0}\\\"></a>\".FormatInvariant(Model.Id))",
"<div class=\"block block-bordered forum-post card\" id=\"post@(Model.Id)\" data-id=\"@Model.Id\">\n <div class=\"block-title card-header\">\n @if (Model.CustomerId... | [
1,
0,
1,
1,
1,
0,
1,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [102], "buggy_code_start_loc": [1], "filenames": ["src/Presentation/SmartStore.Web/Views/Boards/Partials/_ForumPost.cshtml"], "fixing_code_end_loc": [104], "fixing_code_start_loc": [2], "message": "An issue was discovered in Smartstore (aka SmartStoreNET) through 4.1.1. Views/Boards/Partials/_For... | 631 |
Determine whether the {function_name} code is vulnerable or not. | [
"@using SmartStore.Web.Models.Boards;",
"@using SmartStore.Core.Html;\n",
"@model ForumPostModel\n@Html.Raw(\"<a name=\\\"{0}\\\"></a>\".FormatInvariant(Model.Id))",
"<div class=\"block block-bordered forum-post card\" id=\"post@(Model.Id)\" data-id=\"@Model.Id\">\n <div class=\"block-title card-header\">\... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [102], "buggy_code_start_loc": [1], "filenames": ["src/Presentation/SmartStore.Web/Views/Boards/Partials/_ForumPost.cshtml"], "fixing_code_end_loc": [104], "fixing_code_start_loc": [2], "message": "An issue was discovered in Smartstore (aka SmartStoreNET) through 4.1.1. Views/Boards/Partials/_For... | 631 |
Determine whether the {function_name} code is vulnerable or not. | [
"# Change Log",
"## [Unreleased]",
"### Added\n- Resources in location constraints now may be specified by resource name\n patterns in addition to resource names ([rhbz#1362493])\n- Proxy settings description in pcsd configuration file ([rhbz#1315627])\n- Man page for pcsd ([rhbz#1378742])\n- Pcs now allows to... | [
1,
1,
1,
1,
1,
0,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [35, 883, 825], "buggy_code_start_loc": [27, 78, 824], "filenames": ["CHANGELOG.md", "pcsd/public/js/nodes-ember.js", "pcsd/public/js/pcsd.js"], "fixing_code_end_loc": [40, 883, 825], "fixing_code_start_loc": [28, 78, 824], "message": "ClusterLabs pcs before version 0.9.157 is vulnerable to a cro... | 632 |
Determine whether the {function_name} code is vulnerable or not. | [
"# Change Log",
"## [Unreleased]",
"### Added\n- Resources in location constraints now may be specified by resource name\n patterns in addition to resource names ([rhbz#1362493])\n- Proxy settings description in pcsd configuration file ([rhbz#1315627])\n- Man page for pcsd ([rhbz#1378742])\n- Pcs now allows to... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [35, 883, 825], "buggy_code_start_loc": [27, 78, 824], "filenames": ["CHANGELOG.md", "pcsd/public/js/nodes-ember.js", "pcsd/public/js/pcsd.js"], "fixing_code_end_loc": [40, 883, 825], "fixing_code_start_loc": [28, 78, 824], "message": "ClusterLabs pcs before version 0.9.157 is vulnerable to a cro... | 632 |
Determine whether the {function_name} code is vulnerable or not. | [
"Pcs = Ember.Application.createWithMixins({\n LOG_TRANSITIONS: true,\n cluster_name: get_cluster_name(),\n cluster_settings: null,\n cur_page: \"\",\n opening_resource: \"\",\n opening_node: \"\",\n opening_aclrole: \"\",\n resource_page: function() {\n if (this.cur_page == \"resources\") return \"displa... | [
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [35, 883, 825], "buggy_code_start_loc": [27, 78, 824], "filenames": ["CHANGELOG.md", "pcsd/public/js/nodes-ember.js", "pcsd/public/js/pcsd.js"], "fixing_code_end_loc": [40, 883, 825], "fixing_code_start_loc": [28, 78, 824], "message": "ClusterLabs pcs before version 0.9.157 is vulnerable to a cro... | 632 |
Determine whether the {function_name} code is vulnerable or not. | [
"Pcs = Ember.Application.createWithMixins({\n LOG_TRANSITIONS: true,\n cluster_name: get_cluster_name(),\n cluster_settings: null,\n cur_page: \"\",\n opening_resource: \"\",\n opening_node: \"\",\n opening_aclrole: \"\",\n resource_page: function() {\n if (this.cur_page == \"resources\") return \"displa... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [35, 883, 825], "buggy_code_start_loc": [27, 78, 824], "filenames": ["CHANGELOG.md", "pcsd/public/js/nodes-ember.js", "pcsd/public/js/pcsd.js"], "fixing_code_end_loc": [40, 883, 825], "fixing_code_start_loc": [28, 78, 824], "message": "ClusterLabs pcs before version 0.9.157 is vulnerable to a cro... | 632 |
Determine whether the {function_name} code is vulnerable or not. | [
"var pcs_timeout = 30000;\nvar login_dialog_opened = false;\nvar ajax_queue = Array();",
"function curResource() {\n var obj = Pcs.resourcesContainer.get('cur_resource');\n if (obj == null) {\n return null;\n }\n return obj.get('id');\n}",
"function curStonith() {\n var obj = Pcs.resourcesContainer.get(... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [35, 883, 825], "buggy_code_start_loc": [27, 78, 824], "filenames": ["CHANGELOG.md", "pcsd/public/js/nodes-ember.js", "pcsd/public/js/pcsd.js"], "fixing_code_end_loc": [40, 883, 825], "fixing_code_start_loc": [28, 78, 824], "message": "ClusterLabs pcs before version 0.9.157 is vulnerable to a cro... | 632 |
Determine whether the {function_name} code is vulnerable or not. | [
"var pcs_timeout = 30000;\nvar login_dialog_opened = false;\nvar ajax_queue = Array();",
"function curResource() {\n var obj = Pcs.resourcesContainer.get('cur_resource');\n if (obj == null) {\n return null;\n }\n return obj.get('id');\n}",
"function curStonith() {\n var obj = Pcs.resourcesContainer.get(... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [35, 883, 825], "buggy_code_start_loc": [27, 78, 824], "filenames": ["CHANGELOG.md", "pcsd/public/js/nodes-ember.js", "pcsd/public/js/pcsd.js"], "fixing_code_end_loc": [40, 883, 825], "fixing_code_start_loc": [28, 78, 824], "message": "ClusterLabs pcs before version 0.9.157 is vulnerable to a cro... | 632 |
Determine whether the {function_name} code is vulnerable or not. | [
"#!/usr/local/bin/perl\n# A very simple perl web server used by Webmin",
"# Require basic libraries\npackage miniserv;\nuse Socket;\nuse POSIX;\nuse Time::Local;\neval \"use Time::HiRes;\";",
"@itoa64 = split(//, \"./0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz\");",
"# Find and read config ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [2608, 14], "buggy_code_start_loc": [2606, 13], "filenames": ["miniserv.pl", "status/ping-monitor.pl"], "fixing_code_end_loc": [2609, 15], "fixing_code_start_loc": [2606, 13], "message": "miniserv.pl in Webmin 1.962 on Windows mishandles special characters in query arguments to the CGI program.",... | 633 |
Determine whether the {function_name} code is vulnerable or not. | [
"#!/usr/local/bin/perl\n# A very simple perl web server used by Webmin",
"# Require basic libraries\npackage miniserv;\nuse Socket;\nuse POSIX;\nuse Time::Local;\neval \"use Time::HiRes;\";",
"@itoa64 = split(//, \"./0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz\");",
"# Find and read config ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [2608, 14], "buggy_code_start_loc": [2606, 13], "filenames": ["miniserv.pl", "status/ping-monitor.pl"], "fixing_code_end_loc": [2609, 15], "fixing_code_start_loc": [2606, 13], "message": "miniserv.pl in Webmin 1.962 on Windows mishandles special characters in query arguments to the CGI program.",... | 633 |
Determine whether the {function_name} code is vulnerable or not. | [
"# ping-monitor.pl\n# Ping some host\n# Contains code ripped from Net::Ping by Russell Mosemann",
"use Socket;",
"sub get_ping_status\n{\nlocal $wait = defined($_[0]->{'wait'}) ? $_[0]->{'wait'} : 5;\nlocal $ip = &to_ipaddress($_[0]->{'host'}) ||\n\t &to_ip6address($_[0]->{'host'});\nreturn { 'up' => 0 } if ... | [
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [2608, 14], "buggy_code_start_loc": [2606, 13], "filenames": ["miniserv.pl", "status/ping-monitor.pl"], "fixing_code_end_loc": [2609, 15], "fixing_code_start_loc": [2606, 13], "message": "miniserv.pl in Webmin 1.962 on Windows mishandles special characters in query arguments to the CGI program.",... | 633 |
Determine whether the {function_name} code is vulnerable or not. | [
"# ping-monitor.pl\n# Ping some host\n# Contains code ripped from Net::Ping by Russell Mosemann",
"use Socket;",
"sub get_ping_status\n{\nlocal $wait = defined($_[0]->{'wait'}) ? $_[0]->{'wait'} : 5;\nlocal $ip = &to_ipaddress($_[0]->{'host'}) ||\n\t &to_ip6address($_[0]->{'host'});\nreturn { 'up' => 0 } if ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [2608, 14], "buggy_code_start_loc": [2606, 13], "filenames": ["miniserv.pl", "status/ping-monitor.pl"], "fixing_code_end_loc": [2609, 15], "fixing_code_start_loc": [2606, 13], "message": "miniserv.pl in Webmin 1.962 on Windows mishandles special characters in query arguments to the CGI program.",... | 633 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*",
" Copyright 2016 Christian Hoene, Symonics GmbH\n \n*/",
"#include <stdlib.h>\n#include <string.h>\n#include <errno.h>\n#include \"reader.h\"",
"/*\n *\n 00000370 42 54 4c 46 00 08 00 5b 01 00 00 00 2d 00 00 07 |BTLF...[....-...|\n 00000380 00 00 00 f8 ea 72 15 00 c9 03 00 00 00 26 00 00 |.....r.... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
0,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [337], "buggy_code_start_loc": [310], "filenames": ["src/hdf/btree.c"], "fixing_code_end_loc": [337], "fixing_code_start_loc": [310], "message": "treeRead in hdf/btree.c in libmysofa before 0.7 does not properly validate multiplications and additions.", "other": {"cve": {"cisaActionDue": null, "c... | 634 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*",
" Copyright 2016 Christian Hoene, Symonics GmbH\n \n*/",
"#include <stdlib.h>\n#include <string.h>\n#include <errno.h>\n#include \"reader.h\"",
"/*\n *\n 00000370 42 54 4c 46 00 08 00 5b 01 00 00 00 2d 00 00 07 |BTLF...[....-...|\n 00000380 00 00 00 f8 ea 72 15 00 c9 03 00 00 00 26 00 00 |.....r.... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [337], "buggy_code_start_loc": [310], "filenames": ["src/hdf/btree.c"], "fixing_code_end_loc": [337], "fixing_code_start_loc": [310], "message": "treeRead in hdf/btree.c in libmysofa before 0.7 does not properly validate multiplications and additions.", "other": {"cve": {"cisaActionDue": null, "c... | 634 |
Determine whether the {function_name} code is vulnerable or not. | [
"import app from '../common/app';",
"import ItemList from './utils/ItemList';\nimport Button from './components/Button';\nimport ModalManager from './components/ModalManager';\nimport AlertManager from './components/AlertManager';\nimport RequestErrorModal from './components/RequestErrorModal';\nimport Translator... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [423, 7], "buggy_code_start_loc": [413, 6], "filenames": ["framework/core/js/src/common/Application.tsx", "framework/core/views/frontend/app.blade.php"], "fixing_code_end_loc": [429, 7], "fixing_code_start_loc": [413, 6], "message": "Flarum is an open source discussion platform. Flarum's page tit... | 635 |
Determine whether the {function_name} code is vulnerable or not. | [
"import app from '../common/app';",
"import ItemList from './utils/ItemList';\nimport Button from './components/Button';\nimport ModalManager from './components/ModalManager';\nimport AlertManager from './components/AlertManager';\nimport RequestErrorModal from './components/RequestErrorModal';\nimport Translator... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [423, 7], "buggy_code_start_loc": [413, 6], "filenames": ["framework/core/js/src/common/Application.tsx", "framework/core/views/frontend/app.blade.php"], "fixing_code_end_loc": [429, 7], "fixing_code_start_loc": [413, 6], "message": "Flarum is an open source discussion platform. Flarum's page tit... | 635 |
Determine whether the {function_name} code is vulnerable or not. | [
"<!doctype html>\n<html @if ($direction) dir=\"{{ $direction }}\" @endif\n @if ($language) lang=\"{{ $language }}\" @endif>\n <head>\n <meta charset=\"utf-8\">",
" <title>{!! $title !!}</title>",
"\n {!! $head !!}\n </head>",
" <body>\n {!! $layout !!}",
" <d... | [
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [423, 7], "buggy_code_start_loc": [413, 6], "filenames": ["framework/core/js/src/common/Application.tsx", "framework/core/views/frontend/app.blade.php"], "fixing_code_end_loc": [429, 7], "fixing_code_start_loc": [413, 6], "message": "Flarum is an open source discussion platform. Flarum's page tit... | 635 |
Determine whether the {function_name} code is vulnerable or not. | [
"<!doctype html>\n<html @if ($direction) dir=\"{{ $direction }}\" @endif\n @if ($language) lang=\"{{ $language }}\" @endif>\n <head>\n <meta charset=\"utf-8\">",
" <title>{{ $title }}</title>",
"\n {!! $head !!}\n </head>",
" <body>\n {!! $layout !!}",
" <div... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [423, 7], "buggy_code_start_loc": [413, 6], "filenames": ["framework/core/js/src/common/Application.tsx", "framework/core/views/frontend/app.blade.php"], "fixing_code_end_loc": [429, 7], "fixing_code_start_loc": [413, 6], "message": "Flarum is an open source discussion platform. Flarum's page tit... | 635 |
Determine whether the {function_name} code is vulnerable or not. | [
"import os\nimport zipfile\nimport tarfile",
"from flask import request, current_app as ca\nfrom flask_restx import Resource\nimport tempfile\nimport multipart\nimport requests",
"from mindsdb.utilities import log",
"from mindsdb.api.http.utils import http_error",
"from mindsdb.api.http.namespaces.configs.f... | [
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [138, 24], "buggy_code_start_loc": [12, 1], "filenames": ["mindsdb/api/http/namespaces/file.py", "mindsdb/api/http/utils.py"], "fixing_code_end_loc": [138, 40], "fixing_code_start_loc": [12, 2], "message": "mindsdb is a Machine Learning platform to help developers build AI solutions. In affected ... | 636 |
Determine whether the {function_name} code is vulnerable or not. | [
"import os\nimport zipfile\nimport tarfile",
"from flask import request, current_app as ca\nfrom flask_restx import Resource\nimport tempfile\nimport multipart\nimport requests",
"from mindsdb.utilities import log",
"from mindsdb.api.http.utils import http_error, safe_extract",
"from mindsdb.api.http.namesp... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [138, 24], "buggy_code_start_loc": [12, 1], "filenames": ["mindsdb/api/http/namespaces/file.py", "mindsdb/api/http/utils.py"], "fixing_code_end_loc": [138, 40], "fixing_code_start_loc": [12, 2], "message": "mindsdb is a Machine Learning platform to help developers build AI solutions. In affected ... | 636 |
Determine whether the {function_name} code is vulnerable or not. | [
"import json",
"",
"\nfrom flask import Response",
"\ndef http_error(status_code, title, detail=''):\n ''' Wrapper for error responce acoording with RFC 7807 (https://tools.ietf.org/html/rfc7807)",
" :param status_code: int - http status code for response\n :param title: str\n :param... | [
1,
0,
1,
1,
1,
1,
0
] | PreciseBugs | {"buggy_code_end_loc": [138, 24], "buggy_code_start_loc": [12, 1], "filenames": ["mindsdb/api/http/namespaces/file.py", "mindsdb/api/http/utils.py"], "fixing_code_end_loc": [138, 40], "fixing_code_start_loc": [12, 2], "message": "mindsdb is a Machine Learning platform to help developers build AI solutions. In affected ... | 636 |
Determine whether the {function_name} code is vulnerable or not. | [
"import json",
"import os",
"\nfrom flask import Response",
"\ndef http_error(status_code, title, detail=''):\n ''' Wrapper for error responce acoording with RFC 7807 (https://tools.ietf.org/html/rfc7807)",
" :param status_code: int - http status code for response\n :param title: str\n ... | [
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [138, 24], "buggy_code_start_loc": [12, 1], "filenames": ["mindsdb/api/http/namespaces/file.py", "mindsdb/api/http/utils.py"], "fixing_code_end_loc": [138, 40], "fixing_code_start_loc": [12, 2], "message": "mindsdb is a Machine Learning platform to help developers build AI solutions. In affected ... | 636 |
Determine whether the {function_name} code is vulnerable or not. | [
"#include \"source/common/http/conn_manager_impl.h\"",
"#include <cstdint>\n#include <functional>\n#include <list>\n#include <memory>\n#include <string>\n#include <vector>",
"#include \"envoy/buffer/buffer.h\"\n#include \"envoy/common/time.h\"\n#include \"envoy/event/dispatcher.h\"\n#include \"envoy/event/scale... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1731, 849, 1070, 1208, 314, 219, 303], "buggy_code_start_loc": [1731, 330, 910, 1206, 310, 219, 303], "filenames": ["source/common/http/conn_manager_impl.cc", "source/common/http/filter_manager.cc", "source/common/http/filter_manager.h", "source/common/http/http1/codec_impl.cc", "source/common/s... | 637 |
Determine whether the {function_name} code is vulnerable or not. | [
"#include \"source/common/http/conn_manager_impl.h\"",
"#include <cstdint>\n#include <functional>\n#include <list>\n#include <memory>\n#include <string>\n#include <vector>",
"#include \"envoy/buffer/buffer.h\"\n#include \"envoy/common/time.h\"\n#include \"envoy/event/dispatcher.h\"\n#include \"envoy/event/scale... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1731, 849, 1070, 1208, 314, 219, 303], "buggy_code_start_loc": [1731, 330, 910, 1206, 310, 219, 303], "filenames": ["source/common/http/conn_manager_impl.cc", "source/common/http/filter_manager.cc", "source/common/http/filter_manager.h", "source/common/http/http1/codec_impl.cc", "source/common/s... | 637 |
Determine whether the {function_name} code is vulnerable or not. | [
"#include \"source/common/http/filter_manager.h\"",
"#include <functional>",
"#include \"envoy/http/header_map.h\"\n#include \"envoy/matcher/matcher.h\"",
"#include \"source/common/common/enum_to_int.h\"\n#include \"source/common/common/scope_tracked_object_stack.h\"\n#include \"source/common/common/scope_tra... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1731, 849, 1070, 1208, 314, 219, 303], "buggy_code_start_loc": [1731, 330, 910, 1206, 310, 219, 303], "filenames": ["source/common/http/conn_manager_impl.cc", "source/common/http/filter_manager.cc", "source/common/http/filter_manager.h", "source/common/http/http1/codec_impl.cc", "source/common/s... | 637 |
Determine whether the {function_name} code is vulnerable or not. | [
"#include \"source/common/http/filter_manager.h\"",
"#include <functional>",
"#include \"envoy/http/header_map.h\"\n#include \"envoy/matcher/matcher.h\"",
"#include \"source/common/common/enum_to_int.h\"\n#include \"source/common/common/scope_tracked_object_stack.h\"\n#include \"source/common/common/scope_tra... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1731, 849, 1070, 1208, 314, 219, 303], "buggy_code_start_loc": [1731, 330, 910, 1206, 310, 219, 303], "filenames": ["source/common/http/conn_manager_impl.cc", "source/common/http/filter_manager.cc", "source/common/http/filter_manager.h", "source/common/http/http1/codec_impl.cc", "source/common/s... | 637 |
Determine whether the {function_name} code is vulnerable or not. | [
"#pragma once",
"#include <functional>\n#include <memory>",
"#include \"envoy/buffer/buffer.h\"\n#include \"envoy/common/optref.h\"\n#include \"envoy/extensions/filters/common/matcher/action/v3/skip_action.pb.h\"\n#include \"envoy/extensions/filters/network/http_connection_manager/v3/http_connection_manager.pb.... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1731, 849, 1070, 1208, 314, 219, 303], "buggy_code_start_loc": [1731, 330, 910, 1206, 310, 219, 303], "filenames": ["source/common/http/conn_manager_impl.cc", "source/common/http/filter_manager.cc", "source/common/http/filter_manager.h", "source/common/http/http1/codec_impl.cc", "source/common/s... | 637 |
Determine whether the {function_name} code is vulnerable or not. | [
"#pragma once",
"#include <functional>\n#include <memory>",
"#include \"envoy/buffer/buffer.h\"\n#include \"envoy/common/optref.h\"\n#include \"envoy/extensions/filters/common/matcher/action/v3/skip_action.pb.h\"\n#include \"envoy/extensions/filters/network/http_connection_manager/v3/http_connection_manager.pb.... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1731, 849, 1070, 1208, 314, 219, 303], "buggy_code_start_loc": [1731, 330, 910, 1206, 310, 219, 303], "filenames": ["source/common/http/conn_manager_impl.cc", "source/common/http/filter_manager.cc", "source/common/http/filter_manager.h", "source/common/http/http1/codec_impl.cc", "source/common/s... | 637 |
Determine whether the {function_name} code is vulnerable or not. | [
"#include \"source/common/http/http1/codec_impl.h\"",
"#include <memory>\n#include <string>",
"#include \"envoy/buffer/buffer.h\"\n#include \"envoy/common/optref.h\"\n#include \"envoy/http/codec.h\"\n#include \"envoy/http/header_map.h\"\n#include \"envoy/network/connection.h\"",
"#include \"source/common/comm... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1731, 849, 1070, 1208, 314, 219, 303], "buggy_code_start_loc": [1731, 330, 910, 1206, 310, 219, 303], "filenames": ["source/common/http/conn_manager_impl.cc", "source/common/http/filter_manager.cc", "source/common/http/filter_manager.h", "source/common/http/http1/codec_impl.cc", "source/common/s... | 637 |
Determine whether the {function_name} code is vulnerable or not. | [
"#include \"source/common/http/http1/codec_impl.h\"",
"#include <memory>\n#include <string>",
"#include \"envoy/buffer/buffer.h\"\n#include \"envoy/common/optref.h\"\n#include \"envoy/http/codec.h\"\n#include \"envoy/http/header_map.h\"\n#include \"envoy/network/connection.h\"",
"#include \"source/common/comm... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1731, 849, 1070, 1208, 314, 219, 303], "buggy_code_start_loc": [1731, 330, 910, 1206, 310, 219, 303], "filenames": ["source/common/http/conn_manager_impl.cc", "source/common/http/filter_manager.cc", "source/common/http/filter_manager.h", "source/common/http/http1/codec_impl.cc", "source/common/s... | 637 |
Determine whether the {function_name} code is vulnerable or not. | [
"#pragma once",
"#include <chrono>\n#include <cstdint>",
"#include \"envoy/common/time.h\"\n#include \"envoy/config/core/v3/base.pb.h\"\n#include \"envoy/http/header_map.h\"\n#include \"envoy/http/request_id_extension.h\"\n#include \"envoy/network/socket.h\"\n#include \"envoy/stream_info/stream_info.h\"\n#inclu... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1731, 849, 1070, 1208, 314, 219, 303], "buggy_code_start_loc": [1731, 330, 910, 1206, 310, 219, 303], "filenames": ["source/common/http/conn_manager_impl.cc", "source/common/http/filter_manager.cc", "source/common/http/filter_manager.h", "source/common/http/http1/codec_impl.cc", "source/common/s... | 637 |
Determine whether the {function_name} code is vulnerable or not. | [
"#pragma once",
"#include <chrono>\n#include <cstdint>",
"#include \"envoy/common/time.h\"\n#include \"envoy/config/core/v3/base.pb.h\"\n#include \"envoy/http/header_map.h\"\n#include \"envoy/http/request_id_extension.h\"\n#include \"envoy/network/socket.h\"\n#include \"envoy/stream_info/stream_info.h\"\n#inclu... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1731, 849, 1070, 1208, 314, 219, 303], "buggy_code_start_loc": [1731, 330, 910, 1206, 310, 219, 303], "filenames": ["source/common/http/conn_manager_impl.cc", "source/common/http/filter_manager.cc", "source/common/http/filter_manager.h", "source/common/http/http1/codec_impl.cc", "source/common/s... | 637 |
Determine whether the {function_name} code is vulnerable or not. | [
"#include <chrono>\n#include <functional>",
"#include \"envoy/http/protocol.h\"\n#include \"envoy/stream_info/filter_state.h\"\n#include \"envoy/upstream/host_description.h\"",
"#include \"source/common/common/fmt.h\"\n#include \"source/common/protobuf/utility.h\"\n#include \"source/common/stream_info/stream_in... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [1731, 849, 1070, 1208, 314, 219, 303], "buggy_code_start_loc": [1731, 330, 910, 1206, 310, 219, 303], "filenames": ["source/common/http/conn_manager_impl.cc", "source/common/http/filter_manager.cc", "source/common/http/filter_manager.h", "source/common/http/http1/codec_impl.cc", "source/common/s... | 637 |
Determine whether the {function_name} code is vulnerable or not. | [
"#include <chrono>\n#include <functional>",
"#include \"envoy/http/protocol.h\"\n#include \"envoy/stream_info/filter_state.h\"\n#include \"envoy/upstream/host_description.h\"",
"#include \"source/common/common/fmt.h\"\n#include \"source/common/protobuf/utility.h\"\n#include \"source/common/stream_info/stream_in... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [1731, 849, 1070, 1208, 314, 219, 303], "buggy_code_start_loc": [1731, 330, 910, 1206, 310, 219, 303], "filenames": ["source/common/http/conn_manager_impl.cc", "source/common/http/filter_manager.cc", "source/common/http/filter_manager.h", "source/common/http/http1/codec_impl.cc", "source/common/s... | 637 |
Determine whether the {function_name} code is vulnerable or not. | [
"#include \"envoy/config/cluster/v3/cluster.pb.h\"\n#include \"envoy/grpc/status.h\"\n#include \"envoy/service/discovery/v3/discovery.pb.h\"\n#include \"envoy/stats/scope.h\"",
"#include \"source/common/config/protobuf_link_hacks.h\"\n#include \"source/common/protobuf/protobuf.h\"\n#include \"source/common/protob... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1731, 849, 1070, 1208, 314, 219, 303], "buggy_code_start_loc": [1731, 330, 910, 1206, 310, 219, 303], "filenames": ["source/common/http/conn_manager_impl.cc", "source/common/http/filter_manager.cc", "source/common/http/filter_manager.h", "source/common/http/http1/codec_impl.cc", "source/common/s... | 637 |
Determine whether the {function_name} code is vulnerable or not. | [
"#include \"envoy/config/cluster/v3/cluster.pb.h\"\n#include \"envoy/grpc/status.h\"\n#include \"envoy/service/discovery/v3/discovery.pb.h\"\n#include \"envoy/stats/scope.h\"",
"#include \"source/common/config/protobuf_link_hacks.h\"\n#include \"source/common/protobuf/protobuf.h\"\n#include \"source/common/protob... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1731, 849, 1070, 1208, 314, 219, 303], "buggy_code_start_loc": [1731, 330, 910, 1206, 310, 219, 303], "filenames": ["source/common/http/conn_manager_impl.cc", "source/common/http/filter_manager.cc", "source/common/http/filter_manager.h", "source/common/http/http1/codec_impl.cc", "source/common/s... | 637 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%\n% %\n% %\n% W W PPPP GGGG ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [802], "buggy_code_start_loc": [801], "filenames": ["coders/wpg.c"], "fixing_code_end_loc": [802], "fixing_code_start_loc": [801], "message": "coders/wpg.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file.", "other": {"cve": {"cisaActionD... | 638 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%\n% %\n% %\n% W W PPPP GGGG ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [802], "buggy_code_start_loc": [801], "filenames": ["coders/wpg.c"], "fixing_code_end_loc": [802], "fixing_code_start_loc": [801], "message": "coders/wpg.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file.", "other": {"cve": {"cisaActionD... | 638 |
Determine whether the {function_name} code is vulnerable or not. | [
"<!DOCTYPE html PUBLIC \"-//W3C//DTD XHTML 1.0 Transitional//EN\" \"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd\"> \r\n<!-- Read config.ini settings & apply them -->\r\n<cfset iniFile = expandPath(\"/config.ini\")>\r\n<cfset DSN = getProfileString(iniFile, \"coldfusion\", \"DSN\")>\r\n<cfset CurrentStyl... | [
1,
0,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [109], "buggy_code_start_loc": [60], "filenames": ["content/2-Community/articles.cfm"], "fixing_code_end_loc": [111], "fixing_code_start_loc": [61], "message": "A vulnerability was found in iamdroppy phoenixcf. It has been declared as critical. Affected by this vulnerability is an unknown functio... | 639 |
Determine whether the {function_name} code is vulnerable or not. | [
"<!DOCTYPE html PUBLIC \"-//W3C//DTD XHTML 1.0 Transitional//EN\" \"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd\"> \r\n<!-- Read config.ini settings & apply them -->\r\n<cfset iniFile = expandPath(\"/config.ini\")>\r\n<cfset DSN = getProfileString(iniFile, \"coldfusion\", \"DSN\")>\r\n<cfset CurrentStyl... | [
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [109], "buggy_code_start_loc": [60], "filenames": ["content/2-Community/articles.cfm"], "fixing_code_end_loc": [111], "fixing_code_start_loc": [61], "message": "A vulnerability was found in iamdroppy phoenixcf. It has been declared as critical. Affected by this vulnerability is an unknown functio... | 639 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*-\n * Copyright (c) 2008 Christos Zoulas\n * All rights reserved.\n *\n * Redistribution and use in source and binary forms, with or without\n * modification, are permitted provided that the following conditions\n * are met:\n * 1. Redistributions of source code must retain the above copyright\n * notice, thi... | [
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [820], "buggy_code_start_loc": [38], "filenames": ["src/cdf.c"], "fixing_code_end_loc": [824], "fixing_code_start_loc": [38], "message": "The cdf_read_property_info function in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, does not properly vali... | 640 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*-\n * Copyright (c) 2008 Christos Zoulas\n * All rights reserved.\n *\n * Redistribution and use in source and binary forms, with or without\n * modification, are permitted provided that the following conditions\n * are met:\n * 1. Redistributions of source code must retain the above copyright\n * notice, thi... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [820], "buggy_code_start_loc": [38], "filenames": ["src/cdf.c"], "fixing_code_end_loc": [824], "fixing_code_start_loc": [38], "message": "The cdf_read_property_info function in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, does not properly vali... | 640 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*",
" * Copyright (c) 2008, 2009, 2010, 2011, 2012, 2013, 2014, 2015, 2017 Nicira, Inc.",
" *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at:\n *\n * http://www.apache.or... | [
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [3514], "buggy_code_start_loc": [2], "filenames": ["lib/flow.c"], "fixing_code_end_loc": [3527], "fixing_code_start_loc": [2], "message": "In ovs versions v0.90.0 through v2.5.0 are vulnerable to heap buffer over-read in flow.c. An unsafe comparison of \u201cminimasks\u201d function could lead ac... | 641 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*",
" * Copyright (c) 2008, 2009, 2010, 2011, 2012, 2013, 2014, 2015, 2017, 2019 Nicira, Inc.",
" *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at:\n *\n * http://www.apa... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [3514], "buggy_code_start_loc": [2], "filenames": ["lib/flow.c"], "fixing_code_end_loc": [3527], "fixing_code_start_loc": [2], "message": "In ovs versions v0.90.0 through v2.5.0 are vulnerable to heap buffer over-read in flow.c. An unsafe comparison of \u201cminimasks\u201d function could lead ac... | 641 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (C) 2001-2003 FhG Fokus\n *\n * This file is part of opensips, a free SIP server.\n *\n * opensips is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free Software Foundation; either version 2 of the License, or\... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1... | PreciseBugs | {"buggy_code_end_loc": [1548], "buggy_code_start_loc": [1535], "filenames": ["parser/parse_uri.c"], "fixing_code_end_loc": [1548], "fixing_code_start_loc": [1535], "message": "OpenSIPS is a Session Initiation Protocol (SIP) server implementation. Prior to versions 3.1.8 and 3.2.5, when a specially crafted SIP message i... | 642 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (C) 2001-2003 FhG Fokus\n *\n * This file is part of opensips, a free SIP server.\n *\n * opensips is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free Software Foundation; either version 2 of the License, or\... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1548], "buggy_code_start_loc": [1535], "filenames": ["parser/parse_uri.c"], "fixing_code_end_loc": [1548], "fixing_code_start_loc": [1535], "message": "OpenSIPS is a Session Initiation Protocol (SIP) server implementation. Prior to versions 3.1.8 and 3.2.5, when a specially crafted SIP message i... | 642 |
Determine whether the {function_name} code is vulnerable or not. | [
"## ---------------------------------------------------------------------------\n## See the NOTICE file distributed with this work for additional\n## information regarding copyright ownership.\n##\n## This is free software; you can redistribute it and/or modify it\n## under the terms of the GNU Lesser General Publi... | [
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [94], "buggy_code_start_loc": [28], "filenames": ["xwiki-platform-core/xwiki-platform-web/xwiki-platform-web-templates/src/main/resources/templates/documentTags.vm"], "fixing_code_end_loc": [112], "fixing_code_start_loc": [28], "message": "XWiki Platform is a generic wiki platform. Prior to versi... | 643 |
Determine whether the {function_name} code is vulnerable or not. | [
"## ---------------------------------------------------------------------------\n## See the NOTICE file distributed with this work for additional\n## information regarding copyright ownership.\n##\n## This is free software; you can redistribute it and/or modify it\n## under the terms of the GNU Lesser General Publi... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [94], "buggy_code_start_loc": [28], "filenames": ["xwiki-platform-core/xwiki-platform-web/xwiki-platform-web-templates/src/main/resources/templates/documentTags.vm"], "fixing_code_end_loc": [112], "fixing_code_start_loc": [28], "message": "XWiki Platform is a generic wiki platform. Prior to versi... | 643 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* bcon.c */",
"/* Copyright 2009-2012 10gen Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [176, 961, 994, 165, 52, 477, 30, 665, 297, 1739], "buggy_code_start_loc": [175, 109, 138, 105, 38, 41, 28, 231, 51, 115], "filenames": ["src/bcon.c", "src/bson.c", "src/bson.h", "src/encoding.c", "src/encoding.h", "src/env.c", "src/env.h", "src/gridfs.c", "src/gridfs.h", "src/mongo.c"], "fixing_... | 644 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* bcon.c */",
"/* Copyright 2009-2012 10gen Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [176, 961, 994, 165, 52, 477, 30, 665, 297, 1739], "buggy_code_start_loc": [175, 109, 138, 105, 38, 41, 28, 231, 51, 115], "filenames": ["src/bcon.c", "src/bson.c", "src/bson.h", "src/encoding.c", "src/encoding.h", "src/env.c", "src/env.h", "src/gridfs.c", "src/gridfs.h", "src/mongo.c"], "fixing_... | 644 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* bson.c */",
"/* Copyright 2009, 2010 10gen Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [176, 961, 994, 165, 52, 477, 30, 665, 297, 1739], "buggy_code_start_loc": [175, 109, 138, 105, 38, 41, 28, 231, 51, 115], "filenames": ["src/bcon.c", "src/bson.c", "src/bson.h", "src/encoding.c", "src/encoding.h", "src/env.c", "src/env.h", "src/gridfs.c", "src/gridfs.h", "src/mongo.c"], "fixing_... | 644 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* bson.c */",
"/* Copyright 2009, 2010 10gen Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [176, 961, 994, 165, 52, 477, 30, 665, 297, 1739], "buggy_code_start_loc": [175, 109, 138, 105, 38, 41, 28, 231, 51, 115], "filenames": ["src/bcon.c", "src/bson.c", "src/bson.h", "src/encoding.c", "src/encoding.h", "src/env.c", "src/env.h", "src/gridfs.c", "src/gridfs.h", "src/mongo.c"], "fixing_... | 644 |
Determine whether the {function_name} code is vulnerable or not. | [
"/**\n * @file bson.h\n * @brief BSON Declarations\n */",
"/* Copyright 2009-2012 10gen Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [176, 961, 994, 165, 52, 477, 30, 665, 297, 1739], "buggy_code_start_loc": [175, 109, 138, 105, 38, 41, 28, 231, 51, 115], "filenames": ["src/bcon.c", "src/bson.c", "src/bson.h", "src/encoding.c", "src/encoding.h", "src/env.c", "src/env.h", "src/gridfs.c", "src/gridfs.h", "src/mongo.c"], "fixing_... | 644 |
Determine whether the {function_name} code is vulnerable or not. | [
"/**\n * @file bson.h\n * @brief BSON Declarations\n */",
"/* Copyright 2009-2012 10gen Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [176, 961, 994, 165, 52, 477, 30, 665, 297, 1739], "buggy_code_start_loc": [175, 109, 138, 105, 38, 41, 28, 231, 51, 115], "filenames": ["src/bcon.c", "src/bson.c", "src/bson.h", "src/encoding.c", "src/encoding.h", "src/env.c", "src/env.h", "src/gridfs.c", "src/gridfs.h", "src/mongo.c"], "fixing_... | 644 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright 2009-2012 10gen, Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by applicable ... | [
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
0,
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [176, 961, 994, 165, 52, 477, 30, 665, 297, 1739], "buggy_code_start_loc": [175, 109, 138, 105, 38, 41, 28, 231, 51, 115], "filenames": ["src/bcon.c", "src/bson.c", "src/bson.h", "src/encoding.c", "src/encoding.h", "src/env.c", "src/env.h", "src/gridfs.c", "src/gridfs.h", "src/mongo.c"], "fixing_... | 644 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright 2009-2012 10gen, Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by applicable ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [176, 961, 994, 165, 52, 477, 30, 665, 297, 1739], "buggy_code_start_loc": [175, 109, 138, 105, 38, 41, 28, 231, 51, 115], "filenames": ["src/bcon.c", "src/bson.c", "src/bson.h", "src/encoding.c", "src/encoding.h", "src/env.c", "src/env.h", "src/gridfs.c", "src/gridfs.h", "src/mongo.c"], "fixing_... | 644 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright 2009-2012 10gen, Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by applicable ... | [
1,
1,
1,
1,
0,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [176, 961, 994, 165, 52, 477, 30, 665, 297, 1739], "buggy_code_start_loc": [175, 109, 138, 105, 38, 41, 28, 231, 51, 115], "filenames": ["src/bcon.c", "src/bson.c", "src/bson.h", "src/encoding.c", "src/encoding.h", "src/env.c", "src/env.h", "src/gridfs.c", "src/gridfs.h", "src/mongo.c"], "fixing_... | 644 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright 2009-2012 10gen, Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by applicable ... | [
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [176, 961, 994, 165, 52, 477, 30, 665, 297, 1739], "buggy_code_start_loc": [175, 109, 138, 105, 38, 41, 28, 231, 51, 115], "filenames": ["src/bcon.c", "src/bson.c", "src/bson.h", "src/encoding.c", "src/encoding.h", "src/env.c", "src/env.h", "src/gridfs.c", "src/gridfs.h", "src/mongo.c"], "fixing_... | 644 |
Determine whether the {function_name} code is vulnerable or not. | [
"#if !defined(MONGO_ENV_STANDARD) && (defined(_WIN32) || defined(_WIN64))",
"/* env_win32.c */",
"/* Copyright 2009-2012 10gen Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy... | [
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
0,
1,
1,
0,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
0,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [176, 961, 994, 165, 52, 477, 30, 665, 297, 1739], "buggy_code_start_loc": [175, 109, 138, 105, 38, 41, 28, 231, 51, 115], "filenames": ["src/bcon.c", "src/bson.c", "src/bson.h", "src/encoding.c", "src/encoding.h", "src/env.c", "src/env.h", "src/gridfs.c", "src/gridfs.h", "src/mongo.c"], "fixing_... | 644 |
Determine whether the {function_name} code is vulnerable or not. | [
"#if !defined(MONGO_ENV_STANDARD) && (defined(_WIN32) || defined(_WIN64))",
"/* env_win32.c */",
"/* Copyright 2009-2012 10gen Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [176, 961, 994, 165, 52, 477, 30, 665, 297, 1739], "buggy_code_start_loc": [175, 109, 138, 105, 38, 41, 28, 231, 51, 115], "filenames": ["src/bcon.c", "src/bson.c", "src/bson.h", "src/encoding.c", "src/encoding.h", "src/env.c", "src/env.h", "src/gridfs.c", "src/gridfs.h", "src/mongo.c"], "fixing_... | 644 |
Determine whether the {function_name} code is vulnerable or not. | [
"/** @file env.h */",
"/* Copyright 2009-2012 10gen Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\... | [
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [176, 961, 994, 165, 52, 477, 30, 665, 297, 1739], "buggy_code_start_loc": [175, 109, 138, 105, 38, 41, 28, 231, 51, 115], "filenames": ["src/bcon.c", "src/bson.c", "src/bson.h", "src/encoding.c", "src/encoding.h", "src/env.c", "src/env.h", "src/gridfs.c", "src/gridfs.h", "src/mongo.c"], "fixing_... | 644 |
Determine whether the {function_name} code is vulnerable or not. | [
"/** @file env.h */",
"/* Copyright 2009-2012 10gen Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [176, 961, 994, 165, 52, 477, 30, 665, 297, 1739], "buggy_code_start_loc": [175, 109, 138, 105, 38, 41, 28, 231, 51, 115], "filenames": ["src/bcon.c", "src/bson.c", "src/bson.h", "src/encoding.c", "src/encoding.h", "src/env.c", "src/env.h", "src/gridfs.c", "src/gridfs.h", "src/mongo.c"], "fixing_... | 644 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* gridfs.c */",
"/* Copyright 2009-2012 10gen Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [176, 961, 994, 165, 52, 477, 30, 665, 297, 1739], "buggy_code_start_loc": [175, 109, 138, 105, 38, 41, 28, 231, 51, 115], "filenames": ["src/bcon.c", "src/bson.c", "src/bson.h", "src/encoding.c", "src/encoding.h", "src/env.c", "src/env.h", "src/gridfs.c", "src/gridfs.h", "src/mongo.c"], "fixing_... | 644 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* gridfs.c */",
"/* Copyright 2009-2012 10gen Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [176, 961, 994, 165, 52, 477, 30, 665, 297, 1739], "buggy_code_start_loc": [175, 109, 138, 105, 38, 41, 28, 231, 51, 115], "filenames": ["src/bcon.c", "src/bson.c", "src/bson.h", "src/encoding.c", "src/encoding.h", "src/env.c", "src/env.h", "src/gridfs.c", "src/gridfs.h", "src/mongo.c"], "fixing_... | 644 |
Determine whether the {function_name} code is vulnerable or not. | [
"/** @file gridfs.h\n *\n * @brief GridFS declarations\n *\n * */",
"/* Copyright 2009-2012 10gen Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [176, 961, 994, 165, 52, 477, 30, 665, 297, 1739], "buggy_code_start_loc": [175, 109, 138, 105, 38, 41, 28, 231, 51, 115], "filenames": ["src/bcon.c", "src/bson.c", "src/bson.h", "src/encoding.c", "src/encoding.h", "src/env.c", "src/env.h", "src/gridfs.c", "src/gridfs.h", "src/mongo.c"], "fixing_... | 644 |
Determine whether the {function_name} code is vulnerable or not. | [
"/** @file gridfs.h\n *\n * @brief GridFS declarations\n *\n * */",
"/* Copyright 2009-2012 10gen Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [176, 961, 994, 165, 52, 477, 30, 665, 297, 1739], "buggy_code_start_loc": [175, 109, 138, 105, 38, 41, 28, 231, 51, 115], "filenames": ["src/bcon.c", "src/bson.c", "src/bson.h", "src/encoding.c", "src/encoding.h", "src/env.c", "src/env.h", "src/gridfs.c", "src/gridfs.h", "src/mongo.c"], "fixing_... | 644 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* mongo.c */",
"/* Copyright 2009-2012 10gen Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [176, 961, 994, 165, 52, 477, 30, 665, 297, 1739], "buggy_code_start_loc": [175, 109, 138, 105, 38, 41, 28, 231, 51, 115], "filenames": ["src/bcon.c", "src/bson.c", "src/bson.h", "src/encoding.c", "src/encoding.h", "src/env.c", "src/env.h", "src/gridfs.c", "src/gridfs.h", "src/mongo.c"], "fixing_... | 644 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* mongo.c */",
"/* Copyright 2009-2012 10gen Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [176, 961, 994, 165, 52, 477, 30, 665, 297, 1739], "buggy_code_start_loc": [175, 109, 138, 105, 38, 41, 28, 231, 51, 115], "filenames": ["src/bcon.c", "src/bson.c", "src/bson.h", "src/encoding.c", "src/encoding.h", "src/env.c", "src/env.h", "src/gridfs.c", "src/gridfs.h", "src/mongo.c"], "fixing_... | 644 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n$config = array(\n\t'debug' => 0,\n\t'Security' =>\n\t\tarray(\n\t\t\t'level' => 'medium',\n\t\t\t'salt' => '',\n\t\t\t'cipherSeed' => '',",
"",
"\t\t\t//'auth'=>array('CertAuth.Certificate'), // additional authentication methods\n\t\t\t//'auth'=>array('ShibbAuth.ApacheShib... | [
1,
0,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [8], "buggy_code_start_loc": [8], "filenames": ["app/Config/config.default.php"], "fixing_code_end_loc": [10], "fixing_code_start_loc": [9], "message": "The default setting of MISP 2.4.136 did not enable the requirements (aka require_password_confirmation) to provide the previous password when ch... | 645 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n$config = array(\n\t'debug' => 0,\n\t'Security' =>\n\t\tarray(\n\t\t\t'level' => 'medium',\n\t\t\t'salt' => '',\n\t\t\t'cipherSeed' => '',",
" 'require_password_confirmation' => true",
"\t\t\t//'auth'=>array('CertAuth.Certificate'), // additional authentication m... | [
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [8], "buggy_code_start_loc": [8], "filenames": ["app/Config/config.default.php"], "fixing_code_end_loc": [10], "fixing_code_start_loc": [9], "message": "The default setting of MISP 2.4.136 did not enable the requirements (aka require_password_confirmation) to provide the previous password when ch... | 645 |
Determine whether the {function_name} code is vulnerable or not. | [
"package unzip",
"import (\n\t\"archive/zip\"\n\t\"os\"\n\t\"path/filepath\"\n\t\"io\"\n\t\"fmt\"",
"",
")",
"type Unzip struct {\n\tSrc string\n\tDest string\n}",
"func New(src string, dest string) Unzip {\n\treturn Unzip{src, dest}\n}",
"func (uz Unzip) Extract() error {",
"\tfmt.Println(\"Extractio... | [
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [48], "buggy_code_start_loc": [8], "filenames": ["unzip.go"], "fixing_code_end_loc": [53], "fixing_code_start_loc": [9], "message": "Due to improper path sanitization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory.", "other"... | 646 |
Determine whether the {function_name} code is vulnerable or not. | [
"package unzip",
"import (\n\t\"archive/zip\"\n\t\"os\"\n\t\"path/filepath\"\n\t\"io\"\n\t\"fmt\"",
"\t\"strings\"",
")",
"type Unzip struct {\n\tSrc string\n\tDest string\n}",
"func New(src string, dest string) Unzip {\n\treturn Unzip{src, dest}\n}",
"func (uz Unzip) Extract() error {",
"\tfmt.Printl... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [48], "buggy_code_start_loc": [8], "filenames": ["unzip.go"], "fixing_code_end_loc": [53], "fixing_code_start_loc": [9], "message": "Due to improper path sanitization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory.", "other"... | 646 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/**\n * Created by PhpStorm.\n * User: Bojidar\n * Date: 8/19/2020\n * Time: 4:09 PM\n */\nnamespace MicroweberPackages\\Content\\Http\\Controllers\\Admin;",
"use Illuminate\\Http\\Request;\nuse Illuminate\\Http\\Resources\\Json\\JsonResource;\nuse MicroweberPackages\\App\\Http\\Controllers\\AdminControll... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [40, 36, 38, 36], "buggy_code_start_loc": [39, 35, 37, 35], "filenames": ["src/MicroweberPackages/Content/Http/Controllers/Admin/ContentController.php", "src/MicroweberPackages/Page/Http/Controllers/Admin/PageController.php", "src/MicroweberPackages/Post/Http/Controllers/Admin/PostController.php"... | 647 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/**\n * Created by PhpStorm.\n * User: Bojidar\n * Date: 8/19/2020\n * Time: 4:09 PM\n */\nnamespace MicroweberPackages\\Content\\Http\\Controllers\\Admin;",
"use Illuminate\\Http\\Request;\nuse Illuminate\\Http\\Resources\\Json\\JsonResource;\nuse MicroweberPackages\\App\\Http\\Controllers\\AdminControll... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [40, 36, 38, 36], "buggy_code_start_loc": [39, 35, 37, 35], "filenames": ["src/MicroweberPackages/Content/Http/Controllers/Admin/ContentController.php", "src/MicroweberPackages/Page/Http/Controllers/Admin/PageController.php", "src/MicroweberPackages/Post/Http/Controllers/Admin/PostController.php"... | 647 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/**\n * Created by PhpStorm.\n * User: Bojidar\n * Date: 8/19/2020\n * Time: 4:09 PM\n */\nnamespace MicroweberPackages\\Page\\Http\\Controllers\\Admin;",
"use Illuminate\\Http\\Request;\nuse MicroweberPackages\\App\\Http\\Controllers\\AdminController;\nuse MicroweberPackages\\Page\\Repositories\\PageRepo... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [40, 36, 38, 36], "buggy_code_start_loc": [39, 35, 37, 35], "filenames": ["src/MicroweberPackages/Content/Http/Controllers/Admin/ContentController.php", "src/MicroweberPackages/Page/Http/Controllers/Admin/PageController.php", "src/MicroweberPackages/Post/Http/Controllers/Admin/PostController.php"... | 647 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/**\n * Created by PhpStorm.\n * User: Bojidar\n * Date: 8/19/2020\n * Time: 4:09 PM\n */\nnamespace MicroweberPackages\\Page\\Http\\Controllers\\Admin;",
"use Illuminate\\Http\\Request;\nuse MicroweberPackages\\App\\Http\\Controllers\\AdminController;\nuse MicroweberPackages\\Page\\Repositories\\PageRepo... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [40, 36, 38, 36], "buggy_code_start_loc": [39, 35, 37, 35], "filenames": ["src/MicroweberPackages/Content/Http/Controllers/Admin/ContentController.php", "src/MicroweberPackages/Page/Http/Controllers/Admin/PageController.php", "src/MicroweberPackages/Post/Http/Controllers/Admin/PostController.php"... | 647 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/**\n * Created by PhpStorm.\n * User: Bojidar\n * Date: 8/19/2020\n * Time: 4:09 PM\n */\nnamespace MicroweberPackages\\Post\\Http\\Controllers\\Admin;",
"use Illuminate\\Http\\Request;\nuse Illuminate\\Http\\Resources\\Json\\JsonResource;\nuse MicroweberPackages\\App\\Http\\Controllers\\AdminController;... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [40, 36, 38, 36], "buggy_code_start_loc": [39, 35, 37, 35], "filenames": ["src/MicroweberPackages/Content/Http/Controllers/Admin/ContentController.php", "src/MicroweberPackages/Page/Http/Controllers/Admin/PageController.php", "src/MicroweberPackages/Post/Http/Controllers/Admin/PostController.php"... | 647 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/**\n * Created by PhpStorm.\n * User: Bojidar\n * Date: 8/19/2020\n * Time: 4:09 PM\n */\nnamespace MicroweberPackages\\Post\\Http\\Controllers\\Admin;",
"use Illuminate\\Http\\Request;\nuse Illuminate\\Http\\Resources\\Json\\JsonResource;\nuse MicroweberPackages\\App\\Http\\Controllers\\AdminController;... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [40, 36, 38, 36], "buggy_code_start_loc": [39, 35, 37, 35], "filenames": ["src/MicroweberPackages/Content/Http/Controllers/Admin/ContentController.php", "src/MicroweberPackages/Page/Http/Controllers/Admin/PageController.php", "src/MicroweberPackages/Post/Http/Controllers/Admin/PostController.php"... | 647 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/**\n * Created by PhpStorm.\n * User: Bojidar\n * Date: 8/19/2020\n * Time: 4:09 PM\n */\nnamespace MicroweberPackages\\Product\\Http\\Controllers\\Admin;",
"use Illuminate\\Http\\Request;\nuse MicroweberPackages\\App\\Http\\Controllers\\AdminController;\nuse MicroweberPackages\\Product\\Repositories\\Pr... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [40, 36, 38, 36], "buggy_code_start_loc": [39, 35, 37, 35], "filenames": ["src/MicroweberPackages/Content/Http/Controllers/Admin/ContentController.php", "src/MicroweberPackages/Page/Http/Controllers/Admin/PageController.php", "src/MicroweberPackages/Post/Http/Controllers/Admin/PostController.php"... | 647 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/**\n * Created by PhpStorm.\n * User: Bojidar\n * Date: 8/19/2020\n * Time: 4:09 PM\n */\nnamespace MicroweberPackages\\Product\\Http\\Controllers\\Admin;",
"use Illuminate\\Http\\Request;\nuse MicroweberPackages\\App\\Http\\Controllers\\AdminController;\nuse MicroweberPackages\\Product\\Repositories\\Pr... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [40, 36, 38, 36], "buggy_code_start_loc": [39, 35, 37, 35], "filenames": ["src/MicroweberPackages/Content/Http/Controllers/Admin/ContentController.php", "src/MicroweberPackages/Page/Http/Controllers/Admin/PageController.php", "src/MicroweberPackages/Post/Http/Controllers/Admin/PostController.php"... | 647 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"namespace App\\Controller\\Component;",
"use Cake\\Controller\\Component;\nuse Cake\\Error\\Debugger;\nuse Cake\\Utility\\Hash;\nuse Cake\\Utility\\Inflector;\nuse Cake\\View\\ViewBuilder;\nuse Cake\\ORM\\TableRegistry;\nuse Cake\\Http\\Exception\\MethodNotAllowedException;\nuse Cake\\Http\\Exception\... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [425, 161], "buggy_code_start_loc": [422, 9], "filenames": ["src/Controller/Component/CRUDComponent.php", "src/Controller/SharingGroupsController.php"], "fixing_code_end_loc": [432, 202], "fixing_code_start_loc": [423, 10], "message": "An issue was discovered in Cerebrate through 1.4. An incorrec... | 648 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"namespace App\\Controller\\Component;",
"use Cake\\Controller\\Component;\nuse Cake\\Error\\Debugger;\nuse Cake\\Utility\\Hash;\nuse Cake\\Utility\\Inflector;\nuse Cake\\View\\ViewBuilder;\nuse Cake\\ORM\\TableRegistry;\nuse Cake\\Http\\Exception\\MethodNotAllowedException;\nuse Cake\\Http\\Exception\... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [425, 161], "buggy_code_start_loc": [422, 9], "filenames": ["src/Controller/Component/CRUDComponent.php", "src/Controller/SharingGroupsController.php"], "fixing_code_end_loc": [432, 202], "fixing_code_start_loc": [423, 10], "message": "An issue was discovered in Cerebrate through 1.4. An incorrec... | 648 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\nnamespace App\\Controller;",
"use App\\Controller\\AppController;\nuse Cake\\Utility\\Inflector;\nuse Cake\\Utility\\Hash;\nuse Cake\\Utility\\Text;\nuse \\Cake\\Database\\Expression\\QueryExpression;\nuse Cake\\Error\\Debugger;",
"",
"\nclass SharingGroupsController extends AppController\n{\n publ... | [
1,
1,
0,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1,
0,
1,
1,
0,
1,
0,
1,
1,
0,
1,
0,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [425, 161], "buggy_code_start_loc": [422, 9], "filenames": ["src/Controller/Component/CRUDComponent.php", "src/Controller/SharingGroupsController.php"], "fixing_code_end_loc": [432, 202], "fixing_code_start_loc": [423, 10], "message": "An issue was discovered in Cerebrate through 1.4. An incorrec... | 648 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\nnamespace App\\Controller;",
"use App\\Controller\\AppController;\nuse Cake\\Utility\\Inflector;\nuse Cake\\Utility\\Hash;\nuse Cake\\Utility\\Text;\nuse \\Cake\\Database\\Expression\\QueryExpression;\nuse Cake\\Error\\Debugger;",
"use Cake\\Http\\Exception\\NotFoundException;",
"\nclass SharingGroups... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [425, 161], "buggy_code_start_loc": [422, 9], "filenames": ["src/Controller/Component/CRUDComponent.php", "src/Controller/SharingGroupsController.php"], "fixing_code_end_loc": [432, 202], "fixing_code_start_loc": [423, 10], "message": "An issue was discovered in Cerebrate through 1.4. An incorrec... | 648 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * linux/fs/proc/root.c\n *\n * Copyright (C) 1991, 1992 Linus Torvalds\n *\n * proc root directory handling functions\n */",
"#include <asm/uaccess.h>",
"#include <linux/errno.h>\n#include <linux/time.h>\n#include <linux/proc_fs.h>\n#include <linux/stat.h>\n#include <linux/init.h>\n#include <linux/sche... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0
] | PreciseBugs | {"buggy_code_end_loc": [214], "buggy_code_start_loc": [94], "filenames": ["fs/proc/root.c"], "fixing_code_end_loc": [212], "fixing_code_start_loc": [93], "message": "fs/proc/root.c in the procfs implementation in the Linux kernel before 3.2 does not properly interact with CLONE_NEWPID clone system calls, which allows r... | 649 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * linux/fs/proc/root.c\n *\n * Copyright (C) 1991, 1992 Linus Torvalds\n *\n * proc root directory handling functions\n */",
"#include <asm/uaccess.h>",
"#include <linux/errno.h>\n#include <linux/time.h>\n#include <linux/proc_fs.h>\n#include <linux/stat.h>\n#include <linux/init.h>\n#include <linux/sche... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [214], "buggy_code_start_loc": [94], "filenames": ["fs/proc/root.c"], "fixing_code_end_loc": [212], "fixing_code_start_loc": [93], "message": "fs/proc/root.c in the procfs implementation in the Linux kernel before 3.2 does not properly interact with CLONE_NEWPID clone system calls, which allows r... | 649 |
Determine whether the {function_name} code is vulnerable or not. | [
"Version 1.0.47 (unreleased)\n---------------------------",
"New features:",
"* Vietnamese translation",
"",
"\nVersion 1.0.46 (August 13, 2017)\n--------------------------------",
"Security Issues:",
"* Fix two privilege escalation issues: a standard user could reset the password \nof another user (inc... | [
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [6, 69, 111, 157, 162, 186, 155, 67, 127, 208, 51, 7, 9, 9, 7, 10, 8, 10, 7, 11, 13, 7, 8, 8, 11, 7], "buggy_code_start_loc": [6, 48, 37, 157, 15, 63, 61, 67, 4, 6, 51, 6, 8, 8, 6, 7, 6, 7, 6, 8, 12, 6, 6, 5, 6, 6], "filenames": ["ChangeLog", "app/Controller/ActionController.php", "app/Controller... | 650 |
Determine whether the {function_name} code is vulnerable or not. | [
"Version 1.0.47 (unreleased)\n---------------------------",
"New features:",
"* Vietnamese translation",
"\nSecurity Issues:",
"* Avoid people to alter other project resources by changing form data",
"\nVersion 1.0.46 (August 13, 2017)\n--------------------------------",
"Security Issues:",
"* Fix two... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [6, 69, 111, 157, 162, 186, 155, 67, 127, 208, 51, 7, 9, 9, 7, 10, 8, 10, 7, 11, 13, 7, 8, 8, 11, 7], "buggy_code_start_loc": [6, 48, 37, 157, 15, 63, 61, 67, 4, 6, 51, 6, 8, 8, 6, 7, 6, 7, 6, 8, 12, 6, 6, 5, 6, 6], "filenames": ["ChangeLog", "app/Controller/ActionController.php", "app/Controller... | 650 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"namespace Kanboard\\Controller;",
"/**\n * Automatic Actions Controller\n *\n * @package Kanboard\\Controller\n * @author Frederic Guillot\n */\nclass ActionController extends BaseController\n{\n /**\n * List of automatic actions for a given project\n *\n * @access public\n */\n ... | [
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
0,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [6, 69, 111, 157, 162, 186, 155, 67, 127, 208, 51, 7, 9, 9, 7, 10, 8, 10, 7, 11, 13, 7, 8, 8, 11, 7], "buggy_code_start_loc": [6, 48, 37, 157, 15, 63, 61, 67, 4, 6, 51, 6, 8, 8, 6, 7, 6, 7, 6, 8, 12, 6, 6, 5, 6, 6], "filenames": ["ChangeLog", "app/Controller/ActionController.php", "app/Controller... | 650 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"namespace Kanboard\\Controller;",
"/**\n * Automatic Actions Controller\n *\n * @package Kanboard\\Controller\n * @author Frederic Guillot\n */\nclass ActionController extends BaseController\n{\n /**\n * List of automatic actions for a given project\n *\n * @access public\n */\n ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [6, 69, 111, 157, 162, 186, 155, 67, 127, 208, 51, 7, 9, 9, 7, 10, 8, 10, 7, 11, 13, 7, 8, 8, 11, 7], "buggy_code_start_loc": [6, 48, 37, 157, 15, 63, 61, 67, 4, 6, 51, 6, 8, 8, 6, 7, 6, 7, 6, 8, 12, 6, 6, 5, 6, 6], "filenames": ["ChangeLog", "app/Controller/ActionController.php", "app/Controller... | 650 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"namespace Kanboard\\Controller;",
"/**\n * Action Creation Controller\n *\n * @package Kanboard\\Controller\n * @author Frederic Guillot\n */\nclass ActionCreationController extends BaseController\n{\n /**\n * Show the form (step 1)\n *\n * @access public\n */\n public function ... | [
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [6, 69, 111, 157, 162, 186, 155, 67, 127, 208, 51, 7, 9, 9, 7, 10, 8, 10, 7, 11, 13, 7, 8, 8, 11, 7], "buggy_code_start_loc": [6, 48, 37, 157, 15, 63, 61, 67, 4, 6, 51, 6, 8, 8, 6, 7, 6, 7, 6, 8, 12, 6, 6, 5, 6, 6], "filenames": ["ChangeLog", "app/Controller/ActionController.php", "app/Controller... | 650 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"namespace Kanboard\\Controller;",
"/**\n * Action Creation Controller\n *\n * @package Kanboard\\Controller\n * @author Frederic Guillot\n */\nclass ActionCreationController extends BaseController\n{\n /**\n * Show the form (step 1)\n *\n * @access public\n */\n public function ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [6, 69, 111, 157, 162, 186, 155, 67, 127, 208, 51, 7, 9, 9, 7, 10, 8, 10, 7, 11, 13, 7, 8, 8, 11, 7], "buggy_code_start_loc": [6, 48, 37, 157, 15, 63, 61, 67, 4, 6, 51, 6, 8, 8, 6, 7, 6, 7, 6, 8, 12, 6, 6, 5, 6, 6], "filenames": ["ChangeLog", "app/Controller/ActionController.php", "app/Controller... | 650 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"namespace Kanboard\\Controller;",
"use Kanboard\\Core\\Base;\nuse Kanboard\\Core\\Controller\\AccessForbiddenException;\nuse Kanboard\\Core\\Controller\\PageNotFoundException;",
"/**\n * Base Controller\n *\n * @package Kanboard\\Controller\n * @author Frederic Guillot\n */\nabstract class BaseCo... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [6, 69, 111, 157, 162, 186, 155, 67, 127, 208, 51, 7, 9, 9, 7, 10, 8, 10, 7, 11, 13, 7, 8, 8, 11, 7], "buggy_code_start_loc": [6, 48, 37, 157, 15, 63, 61, 67, 4, 6, 51, 6, 8, 8, 6, 7, 6, 7, 6, 8, 12, 6, 6, 5, 6, 6], "filenames": ["ChangeLog", "app/Controller/ActionController.php", "app/Controller... | 650 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"namespace Kanboard\\Controller;",
"use Kanboard\\Core\\Base;\nuse Kanboard\\Core\\Controller\\AccessForbiddenException;\nuse Kanboard\\Core\\Controller\\PageNotFoundException;",
"/**\n * Base Controller\n *\n * @package Kanboard\\Controller\n * @author Frederic Guillot\n */\nabstract class BaseCo... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [6, 69, 111, 157, 162, 186, 155, 67, 127, 208, 51, 7, 9, 9, 7, 10, 8, 10, 7, 11, 13, 7, 8, 8, 11, 7], "buggy_code_start_loc": [6, 48, 37, 157, 15, 63, 61, 67, 4, 6, 51, 6, 8, 8, 6, 7, 6, 7, 6, 8, 12, 6, 6, 5, 6, 6], "filenames": ["ChangeLog", "app/Controller/ActionController.php", "app/Controller... | 650 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.