prompt stringclasses 1
value | completions listlengths 1 63.8k | labels listlengths 1 63.8k | source stringclasses 1
value | other_info stringlengths 2.06k 101k | index int64 0 6.83k |
|---|---|---|---|---|---|
Determine whether the {function_name} code is vulnerable or not. | [
"/*\r\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\r\n *\r\n * Permission is hereby granted, free of charge, to any person obtaining a copy\r\n * of this software and associated documentation files (the \"Software\"), to deal\r\n * in the Software without restriction, including without limitation the r... | [
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\r\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\r\n *\r\n * Permission is hereby granted, free of charge, to any person obtaining a copy\r\n * of this software and associated documentation files (the \"Software\"), to deal\r\n * in the Software without restriction, including without limitation the r... | [
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
0,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
0,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
0,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
0,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
0,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
0,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
0,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
0,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
0,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
0,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
0,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
0,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
0,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
0,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
0,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
0,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
0,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
0,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
0,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
0,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2020 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2020 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
0,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.