prompt
stringclasses
1 value
completions
listlengths
1
63.8k
labels
listlengths
1
63.8k
source
stringclasses
1 value
other_info
stringlengths
2.06k
101k
index
int64
0
6.83k
Determine whether the {function_name} code is vulnerable or not.
[ "/*\r\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\r\n *\r\n * Permission is hereby granted, free of charge, to any person obtaining a copy\r\n * of this software and associated documentation files (the \"Software\"), to deal\r\n * in the Software without restriction, including without limitation the r...
[ 1, 0, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\r\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\r\n *\r\n * Permission is hereby granted, free of charge, to any person obtaining a copy\r\n * of this software and associated documentation files (the \"Software\"), to deal\r\n * in the Software without restriction, including without limitation the r...
[ 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 0, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 0, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 0, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 0, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 0, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 0, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 0, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 0, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 0, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 0, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 0, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 0, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 0, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 0, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 0, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 0, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 0, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 0, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 0, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 0, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 0, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 0, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 0, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 0, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 0, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 0, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 0, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 0, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 0, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 0, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 0, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 0, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 0, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 0, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2020 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2020 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 0, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72