prompt
stringclasses
1 value
completions
listlengths
1
63.8k
labels
listlengths
1
63.8k
source
stringclasses
1 value
other_info
stringlengths
2.06k
101k
index
int64
0
6.83k
Determine whether the {function_name} code is vulnerable or not.
[ "<div class=\"col-lg-12\">\n <div class=\"col-lg-3 center-block pull-none text-center\">\n <a class=\"btn btn-default\" href=\"<%= url '/'%>\">Back to Gem Index</a>\n </div>\n</div>", "<div class=\"col-lg-12\">\n <% gem.by_name do |name, versions| %>\n <div class=\"col-lg-6 center-block pull-none\">\n ...
[ 1, 1, 1, 1, 0, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [5, 273, 35], "buggy_code_start_loc": [4, 2, 34], "filenames": ["Gemfile.lock", "lib/gemirro/server.rb", "views/gem.erb"], "fixing_code_end_loc": [5, 285, 35], "fixing_code_start_loc": [4, 3, 34], "message": "Stored cross-site scripting (XSS) vulnerability in Gemirro before 0.16.0 allows attacker...
707
Determine whether the {function_name} code is vulnerable or not.
[ "<div class=\"col-lg-12\">\n <div class=\"col-lg-3 center-block pull-none text-center\">\n <a class=\"btn btn-default\" href=\"<%= url '/'%>\">Back to Gem Index</a>\n </div>\n</div>", "<div class=\"col-lg-12\">\n <% gem.by_name do |name, versions| %>\n <div class=\"col-lg-6 center-block pull-none\">\n ...
[ 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [5, 273, 35], "buggy_code_start_loc": [4, 2, 34], "filenames": ["Gemfile.lock", "lib/gemirro/server.rb", "views/gem.erb"], "fixing_code_end_loc": [5, 285, 35], "fixing_code_start_loc": [4, 3, 34], "message": "Stored cross-site scripting (XSS) vulnerability in Gemirro before 0.16.0 allows attacker...
707
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Routines for driver control interface\n * Copyright (c) by Jaroslav Kysela <perex@perex.cz>\n *\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free Software Foundation; either version 2 of ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 0, 1, 0, 1, 1, 1, 1, 0, 1, 1, 0, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [1338], "buggy_code_start_loc": [332], "filenames": ["sound/core/control.c"], "fixing_code_end_loc": [1343], "fixing_code_start_loc": [333], "message": "sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not ensure possession of a read/write lock, which...
708
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Routines for driver control interface\n * Copyright (c) by Jaroslav Kysela <perex@perex.cz>\n *\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free Software Foundation; either version 2 of ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [1338], "buggy_code_start_loc": [332], "filenames": ["sound/core/control.c"], "fixing_code_end_loc": [1343], "fixing_code_start_loc": [333], "message": "sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not ensure possession of a read/write lock, which...
708
Determine whether the {function_name} code is vulnerable or not.
[ "<?php", "/**\n * Patient matching and selection dialog.\n *\n * @package OpenEMR\n * @link https://www.open-emr.org\n * @author Rod Roark <rod@sunsetsystems.com>\n * @author Brady Miller <brady.g.miller@gmail.com>\n * @copyright Copyright (c) 2013-2015 Rod Roark <rod@sunsetsystems.com>\n * @copyrigh...
[ 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [56, 333, 169, 174, 105, 286], "buggy_code_start_loc": [55, 332, 139, 112, 104, 280], "filenames": ["interface/orders/patient_match_dialog.php", "interface/patient_file/report/patient_report.php", "interface/usergroup/mfa_registrations.php", "interface/usergroup/mfa_totp.php", "interface/usergrou...
709
Determine whether the {function_name} code is vulnerable or not.
[ "<?php", "/**\n * Patient matching and selection dialog.\n *\n * @package OpenEMR\n * @link https://www.open-emr.org\n * @author Rod Roark <rod@sunsetsystems.com>\n * @author Brady Miller <brady.g.miller@gmail.com>\n * @copyright Copyright (c) 2013-2015 Rod Roark <rod@sunsetsystems.com>\n * @copyrigh...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [56, 333, 169, 174, 105, 286], "buggy_code_start_loc": [55, 332, 139, 112, 104, 280], "filenames": ["interface/orders/patient_match_dialog.php", "interface/patient_file/report/patient_report.php", "interface/usergroup/mfa_registrations.php", "interface/usergroup/mfa_totp.php", "interface/usergrou...
709
Determine whether the {function_name} code is vulnerable or not.
[ "<?php", "/**\n * Patient report\n *\n * @package OpenEMR\n * @link http://www.open-emr.org\n * @author Brady Miller <brady.g.miller@gmail.com>\n * @copyright Copyright (c) 2017-2018 Brady Miller <brady.g.miller@gmail.com>\n * @author Stephen Nielson <stephen@nielson.org>\n * @copyright Copyright (c)...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [56, 333, 169, 174, 105, 286], "buggy_code_start_loc": [55, 332, 139, 112, 104, 280], "filenames": ["interface/orders/patient_match_dialog.php", "interface/patient_file/report/patient_report.php", "interface/usergroup/mfa_registrations.php", "interface/usergroup/mfa_totp.php", "interface/usergrou...
709
Determine whether the {function_name} code is vulnerable or not.
[ "<?php", "/**\n * Patient report\n *\n * @package OpenEMR\n * @link http://www.open-emr.org\n * @author Brady Miller <brady.g.miller@gmail.com>\n * @copyright Copyright (c) 2017-2018 Brady Miller <brady.g.miller@gmail.com>\n * @author Stephen Nielson <stephen@nielson.org>\n * @copyright Copyright (c)...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [56, 333, 169, 174, 105, 286], "buggy_code_start_loc": [55, 332, 139, 112, 104, 280], "filenames": ["interface/orders/patient_match_dialog.php", "interface/patient_file/report/patient_report.php", "interface/usergroup/mfa_registrations.php", "interface/usergroup/mfa_totp.php", "interface/usergrou...
709
Determine whether the {function_name} code is vulnerable or not.
[ "<?php", "/**\n * Multi-Factor Authentication Management\n *\n * @package OpenEMR\n * @link http://www.open-emr.org\n * @author Rod Roark <rod@sunsetsystems.com>\n * @author Brady Miller <brady.g.miller@gmail.com>\n * @copyright Copyright (c) 2018 Rod Roark <rod@sunsetsystems.com>\n * @copyright Copy...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 0, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [56, 333, 169, 174, 105, 286], "buggy_code_start_loc": [55, 332, 139, 112, 104, 280], "filenames": ["interface/orders/patient_match_dialog.php", "interface/patient_file/report/patient_report.php", "interface/usergroup/mfa_registrations.php", "interface/usergroup/mfa_totp.php", "interface/usergrou...
709
Determine whether the {function_name} code is vulnerable or not.
[ "<?php", "/**\n * Multi-Factor Authentication Management\n *\n * @package OpenEMR\n * @link http://www.open-emr.org\n * @author Rod Roark <rod@sunsetsystems.com>\n * @author Brady Miller <brady.g.miller@gmail.com>\n * @copyright Copyright (c) 2018 Rod Roark <rod@sunsetsystems.com>\n * @copyright Copy...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [56, 333, 169, 174, 105, 286], "buggy_code_start_loc": [55, 332, 139, 112, 104, 280], "filenames": ["interface/orders/patient_match_dialog.php", "interface/patient_file/report/patient_report.php", "interface/usergroup/mfa_registrations.php", "interface/usergroup/mfa_totp.php", "interface/usergrou...
709
Determine whether the {function_name} code is vulnerable or not.
[ "<?php", "/**\n * App Based TOTP Support\n *\n * @package OpenEMR\n * @link http://www.open-emr.org\n * @author Anthony Zullo <anthonykzullo@gmail.com>\n * @author Rod Roark <rod@sunsetsystems.com>\n * @author Brady Miller <brady.g.miller@gmail.com>\n * @copyright Copyright (c) 2019 Anthony Zullo ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [56, 333, 169, 174, 105, 286], "buggy_code_start_loc": [55, 332, 139, 112, 104, 280], "filenames": ["interface/orders/patient_match_dialog.php", "interface/patient_file/report/patient_report.php", "interface/usergroup/mfa_registrations.php", "interface/usergroup/mfa_totp.php", "interface/usergrou...
709
Determine whether the {function_name} code is vulnerable or not.
[ "<?php", "/**\n * App Based TOTP Support\n *\n * @package OpenEMR\n * @link http://www.open-emr.org\n * @author Anthony Zullo <anthonykzullo@gmail.com>\n * @author Rod Roark <rod@sunsetsystems.com>\n * @author Brady Miller <brady.g.miller@gmail.com>\n * @copyright Copyright (c) 2019 Anthony Zullo ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [56, 333, 169, 174, 105, 286], "buggy_code_start_loc": [55, 332, 139, 112, 104, 280], "filenames": ["interface/orders/patient_match_dialog.php", "interface/patient_file/report/patient_report.php", "interface/usergroup/mfa_registrations.php", "interface/usergroup/mfa_totp.php", "interface/usergrou...
709
Determine whether the {function_name} code is vulnerable or not.
[ "<?php", "/**\n * FIDO U2F Support Module\n *\n * @package OpenEMR\n * @link http://www.open-emr.org\n * @author Rod Roark <rod@sunsetsystems.com>\n * @author Brady Miller <brady.g.miller@gmail.com>\n * @copyright Copyright (c) 2018 Rod Roark <rod@sunsetsystems.com>\n * @copyright Copyright (c) 2018 ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [56, 333, 169, 174, 105, 286], "buggy_code_start_loc": [55, 332, 139, 112, 104, 280], "filenames": ["interface/orders/patient_match_dialog.php", "interface/patient_file/report/patient_report.php", "interface/usergroup/mfa_registrations.php", "interface/usergroup/mfa_totp.php", "interface/usergrou...
709
Determine whether the {function_name} code is vulnerable or not.
[ "<?php", "/**\n * FIDO U2F Support Module\n *\n * @package OpenEMR\n * @link http://www.open-emr.org\n * @author Rod Roark <rod@sunsetsystems.com>\n * @author Brady Miller <brady.g.miller@gmail.com>\n * @copyright Copyright (c) 2018 Rod Roark <rod@sunsetsystems.com>\n * @copyright Copyright (c) 2018 ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [56, 333, 169, 174, 105, 286], "buggy_code_start_loc": [55, 332, 139, 112, 104, 280], "filenames": ["interface/orders/patient_match_dialog.php", "interface/patient_file/report/patient_report.php", "interface/usergroup/mfa_registrations.php", "interface/usergroup/mfa_totp.php", "interface/usergrou...
709
Determine whether the {function_name} code is vulnerable or not.
[ "<?php", "/**\n * This script Assign acl 'Emergency login'.\n *\n * @package OpenEMR\n * @link http://www.open-emr.org\n * @author Roberto Vasquez <robertogagliotta@gmail.com>\n * @author Brady Miller <brady.g.miller@gmail.com>\n * @author Daniel Pflieger <daniel@mi-squared.com> <daniel@growlingfl...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [56, 333, 169, 174, 105, 286], "buggy_code_start_loc": [55, 332, 139, 112, 104, 280], "filenames": ["interface/orders/patient_match_dialog.php", "interface/patient_file/report/patient_report.php", "interface/usergroup/mfa_registrations.php", "interface/usergroup/mfa_totp.php", "interface/usergrou...
709
Determine whether the {function_name} code is vulnerable or not.
[ "<?php", "/**\n * This script Assign acl 'Emergency login'.\n *\n * @package OpenEMR\n * @link http://www.open-emr.org\n * @author Roberto Vasquez <robertogagliotta@gmail.com>\n * @author Brady Miller <brady.g.miller@gmail.com>\n * @author Daniel Pflieger <daniel@mi-squared.com> <daniel@growlingfl...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [56, 333, 169, 174, 105, 286], "buggy_code_start_loc": [55, 332, 139, 112, 104, 280], "filenames": ["interface/orders/patient_match_dialog.php", "interface/patient_file/report/patient_report.php", "interface/usergroup/mfa_registrations.php", "interface/usergroup/mfa_totp.php", "interface/usergrou...
709
Determine whether the {function_name} code is vulnerable or not.
[ "var Utils = require(\"./util\");\nvar fs = Utils.FileSystem.require(),\n pth = require(\"path\");", "fs.existsSync = fs.existsSync || pth.existsSync;", "var ZipEntry = require(\"./zipEntry\"),\n ZipFile = require(\"./zipFile\");", "var isWin = /^win/.test(process.platform);", "\nmodule.exports = fun...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [471], "buggy_code_start_loc": [356], "filenames": ["adm-zip.js"], "fixing_code_end_loc": [483], "fixing_code_start_loc": [357], "message": "adm-zip npm library before 0.4.9 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in a Zip arc...
710
Determine whether the {function_name} code is vulnerable or not.
[ "var Utils = require(\"./util\");\nvar fs = Utils.FileSystem.require(),\n pth = require(\"path\");", "fs.existsSync = fs.existsSync || pth.existsSync;", "var ZipEntry = require(\"./zipEntry\"),\n ZipFile = require(\"./zipFile\");", "var isWin = /^win/.test(process.platform);", "\nmodule.exports = fun...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [471], "buggy_code_start_loc": [356], "filenames": ["adm-zip.js"], "fixing_code_end_loc": [483], "fixing_code_start_loc": [357], "message": "adm-zip npm library before 0.4.9 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in a Zip arc...
710
Determine whether the {function_name} code is vulnerable or not.
[ "# Changes in HTMLDOC v1.9.16\n", "", "- Updated the GUI interface for current display fonts.", "- Fixed some minor Coverity warnings.", "", "# Changes in HTMLDOC v1.9.15", "- Fixed a potential heap overflow bug with GIF images (Issue #461)\n- Fixed a potential double-free bug with PNG images (Issue #46...
[ 1, 0, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [5, 1599], "buggy_code_start_loc": [2, 26], "filenames": ["CHANGES.md", "htmldoc/image.cxx"], "fixing_code_end_loc": [5, 1619], "fixing_code_start_loc": [3, 27], "message": "There is a vulnerability in htmldoc 1.9.16. In image_load_jpeg function image.cxx when it calls malloc,'img->width' and 'im...
711
Determine whether the {function_name} code is vulnerable or not.
[ "# Changes in HTMLDOC v1.9.16\n", "- Fixed a potential image overflow bug with JPEG and PNG images (Issue #471)\n- Fixed some minor Coverity warnings.", "- Updated the GUI interface for current display fonts.", "", "", "# Changes in HTMLDOC v1.9.15", "- Fixed a potential heap overflow bug with GIF image...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [5, 1599], "buggy_code_start_loc": [2, 26], "filenames": ["CHANGES.md", "htmldoc/image.cxx"], "fixing_code_end_loc": [5, 1619], "fixing_code_start_loc": [3, 27], "message": "There is a vulnerability in htmldoc 1.9.16. In image_load_jpeg function image.cxx when it calls malloc,'img->width' and 'im...
711
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Image handling routines for HTMLDOC, a HTML document processing program.\n *\n * Copyright © 2011-2022 by Michael R Sweet.\n * Copyright © 1997-2010 by Easy Software Products. All rights reserved.\n *\n * This program is free software. Distribution and use rights are outlined in\n * the file \"COPYING\".\...
[ 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [5, 1599], "buggy_code_start_loc": [2, 26], "filenames": ["CHANGES.md", "htmldoc/image.cxx"], "fixing_code_end_loc": [5, 1619], "fixing_code_start_loc": [3, 27], "message": "There is a vulnerability in htmldoc 1.9.16. In image_load_jpeg function image.cxx when it calls malloc,'img->width' and 'im...
711
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Image handling routines for HTMLDOC, a HTML document processing program.\n *\n * Copyright © 2011-2022 by Michael R Sweet.\n * Copyright © 1997-2010 by Easy Software Products. All rights reserved.\n *\n * This program is free software. Distribution and use rights are outlined in\n * the file \"COPYING\".\...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [5, 1599], "buggy_code_start_loc": [2, 26], "filenames": ["CHANGES.md", "htmldoc/image.cxx"], "fixing_code_end_loc": [5, 1619], "fixing_code_start_loc": [3, 27], "message": "There is a vulnerability in htmldoc 1.9.16. In image_load_jpeg function image.cxx when it calls malloc,'img->width' and 'im...
711
Determine whether the {function_name} code is vulnerable or not.
[ "package auth", "import (\n\t\"time\"", "\t\"github.com/golang-jwt/jwt\"", "", "\t\"github.com/sipcapture/homer-app/model\"\n\t\"github.com/sipcapture/homer-app/utils/logger\"\n)", "// jwt token claims which contains info regarding user\ntype JwtUserClaim struct {\n\tUserName string `json:\"usernam...
[ 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [53, 4, 44, 105, 1167, 5], "buggy_code_start_loc": [6, 2, 44, 105, 132, 4], "filenames": ["auth/claims.go", "auth/constants.go", "config/config.go", "etc/webapp_config.json", "main.go", "version.go"], "fixing_code_end_loc": [54, 1, 49, 107, 1193, 5], "fixing_code_start_loc": [7, 1, 45, 106, 133, ...
712
Determine whether the {function_name} code is vulnerable or not.
[ "package auth", "import (\n\t\"time\"", "\t\"github.com/golang-jwt/jwt\"", "\t\"github.com/sipcapture/homer-app/config\"", "\t\"github.com/sipcapture/homer-app/model\"\n\t\"github.com/sipcapture/homer-app/utils/logger\"\n)", "// jwt token claims which contains info regarding user\ntype JwtUserClaim struct...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [53, 4, 44, 105, 1167, 5], "buggy_code_start_loc": [6, 2, 44, 105, 132, 4], "filenames": ["auth/claims.go", "auth/constants.go", "config/config.go", "etc/webapp_config.json", "main.go", "version.go"], "fixing_code_end_loc": [54, 1, 49, 107, 1193, 5], "fixing_code_start_loc": [7, 1, 45, 106, 133, ...
712
Determine whether the {function_name} code is vulnerable or not.
[ "package auth", "\nconst JwtSecret = \"167f0db2-f83e-4baa-9736-d56064a5b415\"", "\n/* our expire time */\nvar TokenExpiryTime = 1200", "// token header\nconst TokenHeader = \"Auth-Token\"" ]
[ 1, 0, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [53, 4, 44, 105, 1167, 5], "buggy_code_start_loc": [6, 2, 44, 105, 132, 4], "filenames": ["auth/claims.go", "auth/constants.go", "config/config.go", "etc/webapp_config.json", "main.go", "version.go"], "fixing_code_end_loc": [54, 1, 49, 107, 1193, 5], "fixing_code_start_loc": [7, 1, 45, 106, 133, ...
712
Determine whether the {function_name} code is vulnerable or not.
[ "package auth", "", "\n/* our expire time */\nvar TokenExpiryTime = 1200", "// token header\nconst TokenHeader = \"Auth-Token\"" ]
[ 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [53, 4, 44, 105, 1167, 5], "buggy_code_start_loc": [6, 2, 44, 105, 132, 4], "filenames": ["auth/claims.go", "auth/constants.go", "config/config.go", "etc/webapp_config.json", "main.go", "version.go"], "fixing_code_end_loc": [54, 1, 49, 107, 1193, 5], "fixing_code_start_loc": [7, 1, 45, 106, 133, ...
712
Determine whether the {function_name} code is vulnerable or not.
[ "package config", "import (\n\t\"net/http\"", "\t\"github.com/sipcapture/homer-app/model\"\n\t\"golang.org/x/oauth2\"\n)", "var Setting HomerSettingServer", "var OAuth2TokenMap map[string]model.OAuth2MapToken", "type HomerSettingServer struct {\n\tMAIN_SETTINGS struct {\n\t\tIsolateQuery string `de...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [53, 4, 44, 105, 1167, 5], "buggy_code_start_loc": [6, 2, 44, 105, 132, 4], "filenames": ["auth/claims.go", "auth/constants.go", "config/config.go", "etc/webapp_config.json", "main.go", "version.go"], "fixing_code_end_loc": [54, 1, 49, 107, 1193, 5], "fixing_code_start_loc": [7, 1, 45, 106, 133, ...
712
Determine whether the {function_name} code is vulnerable or not.
[ "package config", "import (\n\t\"net/http\"", "\t\"github.com/sipcapture/homer-app/model\"\n\t\"golang.org/x/oauth2\"\n)", "var Setting HomerSettingServer", "var OAuth2TokenMap map[string]model.OAuth2MapToken", "type HomerSettingServer struct {\n\tMAIN_SETTINGS struct {\n\t\tIsolateQuery string `de...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [53, 4, 44, 105, 1167, 5], "buggy_code_start_loc": [6, 2, 44, 105, 132, 4], "filenames": ["auth/claims.go", "auth/constants.go", "config/config.go", "etc/webapp_config.json", "main.go", "version.go"], "fixing_code_end_loc": [54, 1, 49, 107, 1193, 5], "fixing_code_start_loc": [7, 1, 45, 106, 133, ...
712
Determine whether the {function_name} code is vulnerable or not.
[ "{\n \"database_data\": {\n \"LocalNode\": {\n \"help\": \"Settings for PGSQL Database (data)\",\n \"node\": \"LocalNode\",\n \"user\": \"homer_user\",\n \"pass\": \"homer_password\",\n \"name\": \"homer_data\",\n \"keepalive\": true,\n \"host\": \"127.0.0.1\"\n }\n },\n ...
[ 1, 0, 1 ]
PreciseBugs
{"buggy_code_end_loc": [53, 4, 44, 105, 1167, 5], "buggy_code_start_loc": [6, 2, 44, 105, 132, 4], "filenames": ["auth/claims.go", "auth/constants.go", "config/config.go", "etc/webapp_config.json", "main.go", "version.go"], "fixing_code_end_loc": [54, 1, 49, 107, 1193, 5], "fixing_code_start_loc": [7, 1, 45, 106, 133, ...
712
Determine whether the {function_name} code is vulnerable or not.
[ "{\n \"database_data\": {\n \"LocalNode\": {\n \"help\": \"Settings for PGSQL Database (data)\",\n \"node\": \"LocalNode\",\n \"user\": \"homer_user\",\n \"pass\": \"homer_password\",\n \"name\": \"homer_data\",\n \"keepalive\": true,\n \"host\": \"127.0.0.1\"\n }\n },\n ...
[ 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [53, 4, 44, 105, 1167, 5], "buggy_code_start_loc": [6, 2, 44, 105, 132, 4], "filenames": ["auth/claims.go", "auth/constants.go", "config/config.go", "etc/webapp_config.json", "main.go", "version.go"], "fixing_code_end_loc": [54, 1, 49, 107, 1193, 5], "fixing_code_start_loc": [7, 1, 45, 106, 133, ...
712
Determine whether the {function_name} code is vulnerable or not.
[ "// Homer-App\n//\n// Homer-App User interface for WEB AI\n//\n// Schemes: http, https\n// Host: localhost:9080\n// BasePath: /api/v3\n// Version: 1.1.2\n// License: AGPL https://www.gnu.org/licenses/agpl-3.0.en.html\n//\t Copyright: QXIP B.V. 2019-2020\n//\n// Consumes:\n// - applicat...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [53, 4, 44, 105, 1167, 5], "buggy_code_start_loc": [6, 2, 44, 105, 132, 4], "filenames": ["auth/claims.go", "auth/constants.go", "config/config.go", "etc/webapp_config.json", "main.go", "version.go"], "fixing_code_end_loc": [54, 1, 49, 107, 1193, 5], "fixing_code_start_loc": [7, 1, 45, 106, 133, ...
712
Determine whether the {function_name} code is vulnerable or not.
[ "// Homer-App\n//\n// Homer-App User interface for WEB AI\n//\n// Schemes: http, https\n// Host: localhost:9080\n// BasePath: /api/v3\n// Version: 1.1.2\n// License: AGPL https://www.gnu.org/licenses/agpl-3.0.en.html\n//\t Copyright: QXIP B.V. 2019-2020\n//\n// Consumes:\n// - applicat...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [53, 4, 44, 105, 1167, 5], "buggy_code_start_loc": [6, 2, 44, 105, 132, 4], "filenames": ["auth/claims.go", "auth/constants.go", "config/config.go", "etc/webapp_config.json", "main.go", "version.go"], "fixing_code_end_loc": [54, 1, 49, 107, 1193, 5], "fixing_code_start_loc": [7, 1, 45, 106, 133, ...
712
Determine whether the {function_name} code is vulnerable or not.
[ "package main", "//VERSION", "var VERSION_APPLICATION = \"1.4.27\"", "\n//NAME\nvar NAME_APPLICATION = \"homer-app\"", "func getVersion() string {\n\treturn VERSION_APPLICATION\n}", "func getName() string {\n\treturn NAME_APPLICATION\n}" ]
[ 1, 1, 0, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [53, 4, 44, 105, 1167, 5], "buggy_code_start_loc": [6, 2, 44, 105, 132, 4], "filenames": ["auth/claims.go", "auth/constants.go", "config/config.go", "etc/webapp_config.json", "main.go", "version.go"], "fixing_code_end_loc": [54, 1, 49, 107, 1193, 5], "fixing_code_start_loc": [7, 1, 45, 106, 133, ...
712
Determine whether the {function_name} code is vulnerable or not.
[ "package main", "//VERSION", "var VERSION_APPLICATION = \"1.4.28\"", "\n//NAME\nvar NAME_APPLICATION = \"homer-app\"", "func getVersion() string {\n\treturn VERSION_APPLICATION\n}", "func getName() string {\n\treturn NAME_APPLICATION\n}" ]
[ 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [53, 4, 44, 105, 1167, 5], "buggy_code_start_loc": [6, 2, 44, 105, 132, 4], "filenames": ["auth/claims.go", "auth/constants.go", "config/config.go", "etc/webapp_config.json", "main.go", "version.go"], "fixing_code_end_loc": [54, 1, 49, 107, 1193, 5], "fixing_code_start_loc": [7, 1, 45, 106, 133, ...
712
Determine whether the {function_name} code is vulnerable or not.
[ "import { isRegExp } from 'util';\nimport { generate } from 'escodegen';\nimport { parseScript } from 'esprima';\nimport { visit, namedTypes as n, builders as b } from 'ast-types';\nimport { Context, RunningScriptOptions } from 'vm';", "import { VM } from 'vm2';", "\n/**\n * Compiles sync JavaScript code into J...
[ 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [142, 182], "buggy_code_start_loc": [6, 162], "filenames": ["src/index.ts", "test/test.ts"], "fixing_code_end_loc": [145, 199], "fixing_code_start_loc": [6, 162], "message": "This affects the package pac-resolver before 5.0.0. This can occur when used with untrusted input, due to unsafe PAC file ...
713
Determine whether the {function_name} code is vulnerable or not.
[ "import { isRegExp } from 'util';\nimport { generate } from 'escodegen';\nimport { parseScript } from 'esprima';\nimport { visit, namedTypes as n, builders as b } from 'ast-types';\nimport { Context, RunningScriptOptions } from 'vm';", "import { VM, VMScript } from 'vm2';", "\n/**\n * Compiles sync JavaScript c...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [142, 182], "buggy_code_start_loc": [6, 162], "filenames": ["src/index.ts", "test/test.ts"], "fixing_code_end_loc": [145, 199], "fixing_code_start_loc": [6, 162], "message": "This affects the package pac-resolver before 5.0.0. This can occur when used with untrusted input, due to unsafe PAC file ...
713
Determine whether the {function_name} code is vulnerable or not.
[ "import fs from 'fs';\nimport path from 'path';\nimport assert from 'assert';\nimport degenerator, { compile } from '../src';", "describe('degenerator()', () => {\n\tit('should support \"async\" output functions', () => {\n\t\tfunction aPlusB(a: () => string, b: () => string): string {\n\t\t\treturn a() + b();\n\...
[ 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1 ]
PreciseBugs
{"buggy_code_end_loc": [142, 182], "buggy_code_start_loc": [6, 162], "filenames": ["src/index.ts", "test/test.ts"], "fixing_code_end_loc": [145, 199], "fixing_code_start_loc": [6, 162], "message": "This affects the package pac-resolver before 5.0.0. This can occur when used with untrusted input, due to unsafe PAC file ...
713
Determine whether the {function_name} code is vulnerable or not.
[ "import fs from 'fs';\nimport path from 'path';\nimport assert from 'assert';\nimport degenerator, { compile } from '../src';", "describe('degenerator()', () => {\n\tit('should support \"async\" output functions', () => {\n\t\tfunction aPlusB(a: () => string, b: () => string): string {\n\t\t\treturn a() + b();\n\...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [142, 182], "buggy_code_start_loc": [6, 162], "filenames": ["src/index.ts", "test/test.ts"], "fixing_code_end_loc": [145, 199], "fixing_code_start_loc": [6, 162], "message": "This affects the package pac-resolver before 5.0.0. This can occur when used with untrusted input, due to unsafe PAC file ...
713
Determine whether the {function_name} code is vulnerable or not.
[ "package org.openmrs.module.appointmentscheduling;", "import org.openmrs.BaseOpenmrsData;\nimport org.openmrs.Patient;\nimport org.openmrs.Provider;", "", "\nimport java.util.Date;", "/**\n * persisted object that reflects a request by a provider (or other user) for a scheduler to schedule a patient for a f...
[ 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [99, 297], "buggy_code_start_loc": [5, 87], "filenames": ["api/src/main/java/org/openmrs/module/appointmentscheduling/AppointmentRequest.java", "api/src/test/java/org/openmrs/module/appointmentscheduling/api/AppointmentRequestServiceTest.java"], "fixing_code_end_loc": [100, 306], "fixing_code_sta...
714
Determine whether the {function_name} code is vulnerable or not.
[ "package org.openmrs.module.appointmentscheduling;", "import org.openmrs.BaseOpenmrsData;\nimport org.openmrs.Patient;\nimport org.openmrs.Provider;", "import org.openmrs.web.WebUtil;", "\nimport java.util.Date;", "/**\n * persisted object that reflects a request by a provider (or other user) for a schedule...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [99, 297], "buggy_code_start_loc": [5, 87], "filenames": ["api/src/main/java/org/openmrs/module/appointmentscheduling/AppointmentRequest.java", "api/src/test/java/org/openmrs/module/appointmentscheduling/api/AppointmentRequestServiceTest.java"], "fixing_code_end_loc": [100, 306], "fixing_code_sta...
714
Determine whether the {function_name} code is vulnerable or not.
[ "package org.openmrs.module.appointmentscheduling.api;", "import org.junit.Before;\nimport org.junit.Test;\nimport org.openmrs.Patient;\nimport org.openmrs.Provider;\nimport org.openmrs.api.APIException;\nimport org.openmrs.api.LocationService;\nimport org.openmrs.api.PatientService;\nimport org.openmrs.api.Provi...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [99, 297], "buggy_code_start_loc": [5, 87], "filenames": ["api/src/main/java/org/openmrs/module/appointmentscheduling/AppointmentRequest.java", "api/src/test/java/org/openmrs/module/appointmentscheduling/api/AppointmentRequestServiceTest.java"], "fixing_code_end_loc": [100, 306], "fixing_code_sta...
714
Determine whether the {function_name} code is vulnerable or not.
[ "package org.openmrs.module.appointmentscheduling.api;", "import org.junit.Before;\nimport org.junit.Test;\nimport org.openmrs.Patient;\nimport org.openmrs.Provider;\nimport org.openmrs.api.APIException;\nimport org.openmrs.api.LocationService;\nimport org.openmrs.api.PatientService;\nimport org.openmrs.api.Provi...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [99, 297], "buggy_code_start_loc": [5, 87], "filenames": ["api/src/main/java/org/openmrs/module/appointmentscheduling/AppointmentRequest.java", "api/src/test/java/org/openmrs/module/appointmentscheduling/api/AppointmentRequestServiceTest.java"], "fixing_code_end_loc": [100, 306], "fixing_code_sta...
714
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n *\t\t\tGPAC - Multimedia Framework C SDK\n *\n *\t\t\tAuthors: Jean Le Feuvre\n *\t\t\tCopyright (c) Telecom ParisTech 2000-2012\n *\t\t\t\t\tAll rights reserved\n *\n * This file is part of GPAC / Media Tools sub-project\n *\n * GPAC is free software; you can redistribute it and/or modify\n * it under the...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [407], "buggy_code_start_loc": [404], "filenames": ["src/media_tools/isom_hinter.c"], "fixing_code_end_loc": [407], "fixing_code_start_loc": [405], "message": "The gf_hinter_track_new function in GPAC 1.0.1 allows attackers to read memory via a crafted file in the MP4Box command.", "other": {"cve...
715
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n *\t\t\tGPAC - Multimedia Framework C SDK\n *\n *\t\t\tAuthors: Jean Le Feuvre\n *\t\t\tCopyright (c) Telecom ParisTech 2000-2012\n *\t\t\t\t\tAll rights reserved\n *\n * This file is part of GPAC / Media Tools sub-project\n *\n * GPAC is free software; you can redistribute it and/or modify\n * it under the...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [407], "buggy_code_start_loc": [404], "filenames": ["src/media_tools/isom_hinter.c"], "fixing_code_end_loc": [407], "fixing_code_start_loc": [405], "message": "The gf_hinter_track_new function in GPAC 1.0.1 allows attackers to read memory via a crafted file in the MP4Box command.", "other": {"cve...
715
Determine whether the {function_name} code is vulnerable or not.
[ "", "2022-04-26: Fix text formatting\n2022-04-26: Fix array boundary check when parsing inflections which could result in buffer over-read with corrupt input\n2022-04-23: Fix formatting\n2022-04-23: Fix checking boundary of deobfuscation key which could cause buffer over-read with corrupt data\n2022-04-23: Fix is...
[ 0, 1 ]
PreciseBugs
{"buggy_code_end_loc": [0, 988], "buggy_code_start_loc": [0, 964], "filenames": ["ChangeLog", "src/index.c"], "fixing_code_end_loc": [2, 984], "fixing_code_start_loc": [1, 963], "message": "Buffer Over-read in GitHub repository bfabiszewski/libmobi prior to 0.11. This vulnerability is capable of arbitrary code executio...
716
Determine whether the {function_name} code is vulnerable or not.
[ "2022-04-27: Fix wrong boundary checks in inflections parser resulting in stack buffer over-read with corrupt input", "2022-04-26: Fix text formatting\n2022-04-26: Fix array boundary check when parsing inflections which could result in buffer over-read with corrupt input\n2022-04-23: Fix formatting\n2022-04-23: F...
[ 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [0, 988], "buggy_code_start_loc": [0, 964], "filenames": ["ChangeLog", "src/index.c"], "fixing_code_end_loc": [2, 984], "fixing_code_start_loc": [1, 963], "message": "Buffer Over-read in GitHub repository bfabiszewski/libmobi prior to 0.11. This vulnerability is capable of arbitrary code executio...
716
Determine whether the {function_name} code is vulnerable or not.
[ "/** @file index.c\n * @brief Functions to parse index records\n *\n * Copyright (c) 2020 Bartek Fabiszewski\n * http://www.fabiszewski.net\n *\n * This file is part of libmobi.\n * Licensed under LGPL, either version 3, or any later.\n * See <http://www.gnu.org/licenses/>\n */", "#define _GNU_SOURCE 1\n#ifndef ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 0, 1, 0, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [0, 988], "buggy_code_start_loc": [0, 964], "filenames": ["ChangeLog", "src/index.c"], "fixing_code_end_loc": [2, 984], "fixing_code_start_loc": [1, 963], "message": "Buffer Over-read in GitHub repository bfabiszewski/libmobi prior to 0.11. This vulnerability is capable of arbitrary code executio...
716
Determine whether the {function_name} code is vulnerable or not.
[ "/** @file index.c\n * @brief Functions to parse index records\n *\n * Copyright (c) 2020 Bartek Fabiszewski\n * http://www.fabiszewski.net\n *\n * This file is part of libmobi.\n * Licensed under LGPL, either version 3, or any later.\n * See <http://www.gnu.org/licenses/>\n */", "#define _GNU_SOURCE 1\n#ifndef ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [0, 988], "buggy_code_start_loc": [0, 964], "filenames": ["ChangeLog", "src/index.c"], "fixing_code_end_loc": [2, 984], "fixing_code_start_loc": [1, 963], "message": "Buffer Over-read in GitHub repository bfabiszewski/libmobi prior to 0.11. This vulnerability is capable of arbitrary code executio...
716
Determine whether the {function_name} code is vulnerable or not.
[ "/* vi:set ts=8 sts=4 sw=4 noet:\n *\n * VIM - Vi IMproved\tby Bram Moolenaar\n *\n * Do \":help uganda\" in Vim to read copying and usage conditions.\n * Do \":help credits\" in Vim to see a list of people who contributed.\n * See README.txt for an overview of the Vim source code.\n */", "/*\n * getchar.c: Code...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [257, 738, 752], "buggy_code_start_loc": [255, 738, 752], "filenames": ["src/getchar.c", "src/testdir/test_registers.vim", "src/version.c"], "fixing_code_end_loc": [260, 748, 755], "fixing_code_start_loc": [255, 739, 753], "message": "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2."...
717
Determine whether the {function_name} code is vulnerable or not.
[ "/* vi:set ts=8 sts=4 sw=4 noet:\n *\n * VIM - Vi IMproved\tby Bram Moolenaar\n *\n * Do \":help uganda\" in Vim to read copying and usage conditions.\n * Do \":help credits\" in Vim to see a list of people who contributed.\n * See README.txt for an overview of the Vim source code.\n */", "/*\n * getchar.c: Code...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [257, 738, 752], "buggy_code_start_loc": [255, 738, 752], "filenames": ["src/getchar.c", "src/testdir/test_registers.vim", "src/version.c"], "fixing_code_end_loc": [260, 748, 755], "fixing_code_start_loc": [255, 739, 753], "message": "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2."...
717
Determine whether the {function_name} code is vulnerable or not.
[ "\" Tests for register operations", "source check.vim\nsource view_util.vim", "\" This test must be executed first to check for empty and unset registers.\nfunc Test_aaa_empty_reg_test()\n call assert_fails('normal @@', 'E748:')\n call assert_fails('normal @%', 'E354:')\n call assert_fails('normal @#', 'E354...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [257, 738, 752], "buggy_code_start_loc": [255, 738, 752], "filenames": ["src/getchar.c", "src/testdir/test_registers.vim", "src/version.c"], "fixing_code_end_loc": [260, 748, 755], "fixing_code_start_loc": [255, 739, 753], "message": "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2."...
717
Determine whether the {function_name} code is vulnerable or not.
[ "\" Tests for register operations", "source check.vim\nsource view_util.vim", "\" This test must be executed first to check for empty and unset registers.\nfunc Test_aaa_empty_reg_test()\n call assert_fails('normal @@', 'E748:')\n call assert_fails('normal @%', 'E354:')\n call assert_fails('normal @#', 'E354...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [257, 738, 752], "buggy_code_start_loc": [255, 738, 752], "filenames": ["src/getchar.c", "src/testdir/test_registers.vim", "src/version.c"], "fixing_code_end_loc": [260, 748, 755], "fixing_code_start_loc": [255, 739, 753], "message": "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2."...
717
Determine whether the {function_name} code is vulnerable or not.
[ "/* vi:set ts=8 sts=4 sw=4 noet:\n *\n * VIM - Vi IMproved\t\tby Bram Moolenaar\n *\n * Do \":help uganda\" in Vim to read copying and usage conditions.\n * Do \":help credits\" in Vim to see a list of people who contributed.\n * See README.txt for an overview of the Vim source code.\n */", "#include \"vim.h\"",...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [257, 738, 752], "buggy_code_start_loc": [255, 738, 752], "filenames": ["src/getchar.c", "src/testdir/test_registers.vim", "src/version.c"], "fixing_code_end_loc": [260, 748, 755], "fixing_code_start_loc": [255, 739, 753], "message": "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2."...
717
Determine whether the {function_name} code is vulnerable or not.
[ "/* vi:set ts=8 sts=4 sw=4 noet:\n *\n * VIM - Vi IMproved\t\tby Bram Moolenaar\n *\n * Do \":help uganda\" in Vim to read copying and usage conditions.\n * Do \":help credits\" in Vim to see a list of people who contributed.\n * See README.txt for an overview of the Vim source code.\n */", "#include \"vim.h\"",...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [257, 738, 752], "buggy_code_start_loc": [255, 738, 752], "filenames": ["src/getchar.c", "src/testdir/test_registers.vim", "src/version.c"], "fixing_code_end_loc": [260, 748, 755], "fixing_code_start_loc": [255, 739, 753], "message": "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2."...
717
Determine whether the {function_name} code is vulnerable or not.
[ "// SPDX-License-Identifier: GPL-2.0\n/*\n * linux/fs/ext4/inode.c\n *\n * Copyright (C) 1992, 1993, 1994, 1995\n * Remy Card (card@masi.ibp.fr)\n * Laboratoire MASI - Institut Blaise Pascal\n * Universite Pierre et Marie Curie (Paris VI)\n *\n * from\n *\n * linux/fs/minix/inode.c\n *\n * Copyright (C) 1991, 1...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [5572, 3570], "buggy_code_start_loc": [5571, 3548], "filenames": ["fs/ext4/inode.c", "fs/ext4/super.c"], "fixing_code_end_loc": [5588, 3573], "fixing_code_start_loc": [5572, 3548], "message": "The Linux kernel before 5.4.2 mishandles ext4_expand_extra_isize, as demonstrated by use-after-free erro...
718
Determine whether the {function_name} code is vulnerable or not.
[ "// SPDX-License-Identifier: GPL-2.0\n/*\n * linux/fs/ext4/inode.c\n *\n * Copyright (C) 1992, 1993, 1994, 1995\n * Remy Card (card@masi.ibp.fr)\n * Laboratoire MASI - Institut Blaise Pascal\n * Universite Pierre et Marie Curie (Paris VI)\n *\n * from\n *\n * linux/fs/minix/inode.c\n *\n * Copyright (C) 1991, 1...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [5572, 3570], "buggy_code_start_loc": [5571, 3548], "filenames": ["fs/ext4/inode.c", "fs/ext4/super.c"], "fixing_code_end_loc": [5588, 3573], "fixing_code_start_loc": [5572, 3548], "message": "The Linux kernel before 5.4.2 mishandles ext4_expand_extra_isize, as demonstrated by use-after-free erro...
718
Determine whether the {function_name} code is vulnerable or not.
[ "// SPDX-License-Identifier: GPL-2.0\n/*\n * linux/fs/ext4/super.c\n *\n * Copyright (C) 1992, 1993, 1994, 1995\n * Remy Card (card@masi.ibp.fr)\n * Laboratoire MASI - Institut Blaise Pascal\n * Universite Pierre et Marie Curie (Paris VI)\n *\n * from\n *\n * linux/fs/minix/inode.c\n *\n * Copyright (C) 1991, 1...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [5572, 3570], "buggy_code_start_loc": [5571, 3548], "filenames": ["fs/ext4/inode.c", "fs/ext4/super.c"], "fixing_code_end_loc": [5588, 3573], "fixing_code_start_loc": [5572, 3548], "message": "The Linux kernel before 5.4.2 mishandles ext4_expand_extra_isize, as demonstrated by use-after-free erro...
718
Determine whether the {function_name} code is vulnerable or not.
[ "// SPDX-License-Identifier: GPL-2.0\n/*\n * linux/fs/ext4/super.c\n *\n * Copyright (C) 1992, 1993, 1994, 1995\n * Remy Card (card@masi.ibp.fr)\n * Laboratoire MASI - Institut Blaise Pascal\n * Universite Pierre et Marie Curie (Paris VI)\n *\n * from\n *\n * linux/fs/minix/inode.c\n *\n * Copyright (C) 1991, 1...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [5572, 3570], "buggy_code_start_loc": [5571, 3548], "filenames": ["fs/ext4/inode.c", "fs/ext4/super.c"], "fixing_code_end_loc": [5588, 3573], "fixing_code_start_loc": [5572, 3548], "message": "The Linux kernel before 5.4.2 mishandles ext4_expand_extra_isize, as demonstrated by use-after-free erro...
718
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%\n% %\n% %\n% ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [4595], "buggy_code_start_loc": [4594], "filenames": ["coders/png.c"], "fixing_code_end_loc": [4595], "fixing_code_start_loc": [4594], "message": "In ImageMagick 7.0.7-29 and earlier, a missing NULL check in ReadOneJNGImage in coders/png.c allows an attacker to cause a denial of service (WriteBlo...
719
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%\n% %\n% %\n% ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [4595], "buggy_code_start_loc": [4594], "filenames": ["coders/png.c"], "fixing_code_end_loc": [4595], "fixing_code_start_loc": [4594], "message": "In ImageMagick 7.0.7-29 and earlier, a missing NULL check in ReadOneJNGImage in coders/png.c allows an attacker to cause a denial of service (WriteBlo...
719
Determine whether the {function_name} code is vulnerable or not.
[ "import * as Utils from './utils';\nimport Exception from './exception';\nimport {\n COMPILER_REVISION,\n createFrame,\n LAST_COMPATIBLE_COMPILER_REVISION,\n REVISION_CHANGES\n} from './base';\nimport { moveHelperToHooks } from './helpers';\nimport { wrapHelper } from './internal/wrapHelper';\nimport {\n creat...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [128, 300], "buggy_code_start_loc": [127, 300], "filenames": ["lib/handlebars/runtime.js", "spec/security.js"], "fixing_code_end_loc": [128, 305], "fixing_code_start_loc": [127, 301], "message": "The package handlebars before 4.7.7 are vulnerable to Remote Code Execution (RCE) when selecting cert...
720
Determine whether the {function_name} code is vulnerable or not.
[ "import * as Utils from './utils';\nimport Exception from './exception';\nimport {\n COMPILER_REVISION,\n createFrame,\n LAST_COMPATIBLE_COMPILER_REVISION,\n REVISION_CHANGES\n} from './base';\nimport { moveHelperToHooks } from './helpers';\nimport { wrapHelper } from './internal/wrapHelper';\nimport {\n creat...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [128, 300], "buggy_code_start_loc": [127, 300], "filenames": ["lib/handlebars/runtime.js", "spec/security.js"], "fixing_code_end_loc": [128, 305], "fixing_code_start_loc": [127, 301], "message": "The package handlebars before 4.7.7 are vulnerable to Remote Code Execution (RCE) when selecting cert...
720
Determine whether the {function_name} code is vulnerable or not.
[ "describe('security issues', function() {\n describe('GH-1495: Prevent Remote Code Execution via constructor', function() {\n it('should not allow constructors to be accessed', function() {\n expectTemplate('{{lookup (lookup this \"constructor\") \"name\"}}')\n .withInput({})\n .toCompileTo('...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [128, 300], "buggy_code_start_loc": [127, 300], "filenames": ["lib/handlebars/runtime.js", "spec/security.js"], "fixing_code_end_loc": [128, 305], "fixing_code_start_loc": [127, 301], "message": "The package handlebars before 4.7.7 are vulnerable to Remote Code Execution (RCE) when selecting cert...
720
Determine whether the {function_name} code is vulnerable or not.
[ "describe('security issues', function() {\n describe('GH-1495: Prevent Remote Code Execution via constructor', function() {\n it('should not allow constructors to be accessed', function() {\n expectTemplate('{{lookup (lookup this \"constructor\") \"name\"}}')\n .withInput({})\n .toCompileTo('...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [128, 300], "buggy_code_start_loc": [127, 300], "filenames": ["lib/handlebars/runtime.js", "spec/security.js"], "fixing_code_end_loc": [128, 305], "fixing_code_start_loc": [127, 301], "message": "The package handlebars before 4.7.7 are vulnerable to Remote Code Execution (RCE) when selecting cert...
720
Determine whether the {function_name} code is vulnerable or not.
[ "<table class=\"index adjustments\" data-hook=\"adjustments\">\n <thead data-hook=\"adjustmment_head\">\n <tr>\n <th><%= Spree::Adjustment.human_attribute_name(:adjustable) %></th>\n <th><%= Spree::Adjustment.human_attribute_name(:label) %></th>\n <th><%= Spree::Adjustment.human_attribute_name(:a...
[ 1, 0, 1, 0, 1 ]
PreciseBugs
{"buggy_code_end_loc": [22, 95, 113], "buggy_code_start_loc": [16, 80, 113], "filenames": ["backend/app/views/spree/admin/adjustments/_adjustments_table.html.erb", "backend/config/routes.rb", "backend/spec/features/admin/orders/adjustments_spec.rb"], "fixing_code_end_loc": [22, 95, 152], "fixing_code_start_loc": [16, 8...
721
Determine whether the {function_name} code is vulnerable or not.
[ "<table class=\"index adjustments\" data-hook=\"adjustments\">\n <thead data-hook=\"adjustmment_head\">\n <tr>\n <th><%= Spree::Adjustment.human_attribute_name(:adjustable) %></th>\n <th><%= Spree::Adjustment.human_attribute_name(:label) %></th>\n <th><%= Spree::Adjustment.human_attribute_name(:a...
[ 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [22, 95, 113], "buggy_code_start_loc": [16, 80, 113], "filenames": ["backend/app/views/spree/admin/adjustments/_adjustments_table.html.erb", "backend/config/routes.rb", "backend/spec/features/admin/orders/adjustments_spec.rb"], "fixing_code_end_loc": [22, 95, 152], "fixing_code_start_loc": [16, 8...
721
Determine whether the {function_name} code is vulnerable or not.
[ "# frozen_string_literal: true", "Spree::Core::Engine.routes.draw do\n namespace :admin do\n get '/search/users', to: \"search#users\", as: :search_users\n get '/search/products', to: \"search#products\", as: :search_products", " put '/locale/set', to: 'locale#set', defaults: { format: :json }, as: :s...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [22, 95, 113], "buggy_code_start_loc": [16, 80, 113], "filenames": ["backend/app/views/spree/admin/adjustments/_adjustments_table.html.erb", "backend/config/routes.rb", "backend/spec/features/admin/orders/adjustments_spec.rb"], "fixing_code_end_loc": [22, 95, 152], "fixing_code_start_loc": [16, 8...
721
Determine whether the {function_name} code is vulnerable or not.
[ "# frozen_string_literal: true", "Spree::Core::Engine.routes.draw do\n namespace :admin do\n get '/search/users', to: \"search#users\", as: :search_users\n get '/search/products', to: \"search#products\", as: :search_products", " put '/locale/set', to: 'locale#set', defaults: { format: :json }, as: :s...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [22, 95, 113], "buggy_code_start_loc": [16, 80, 113], "filenames": ["backend/app/views/spree/admin/adjustments/_adjustments_table.html.erb", "backend/config/routes.rb", "backend/spec/features/admin/orders/adjustments_spec.rb"], "fixing_code_end_loc": [22, 95, 152], "fixing_code_start_loc": [16, 8...
721
Determine whether the {function_name} code is vulnerable or not.
[ "# frozen_string_literal: true", "require 'spec_helper'", "describe \"Adjustments\", type: :feature do\n stub_authorization!", " context \"when the order is completed\" do\n let!(:ship_address) { create(:address) }\n let!(:tax_zone) { create(:global_zone) } # will include the above address\n let!(:...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [22, 95, 113], "buggy_code_start_loc": [16, 80, 113], "filenames": ["backend/app/views/spree/admin/adjustments/_adjustments_table.html.erb", "backend/config/routes.rb", "backend/spec/features/admin/orders/adjustments_spec.rb"], "fixing_code_end_loc": [22, 95, 152], "fixing_code_start_loc": [16, 8...
721
Determine whether the {function_name} code is vulnerable or not.
[ "# frozen_string_literal: true", "require 'spec_helper'", "describe \"Adjustments\", type: :feature do\n stub_authorization!", " context \"when the order is completed\" do\n let!(:ship_address) { create(:address) }\n let!(:tax_zone) { create(:global_zone) } # will include the above address\n let!(:...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [22, 95, 113], "buggy_code_start_loc": [16, 80, 113], "filenames": ["backend/app/views/spree/admin/adjustments/_adjustments_table.html.erb", "backend/config/routes.rb", "backend/spec/features/admin/orders/adjustments_spec.rb"], "fixing_code_end_loc": [22, 95, 152], "fixing_code_start_loc": [16, 8...
721
Determine whether the {function_name} code is vulnerable or not.
[ "/* vi:set et sw=2 sts=2 cin cino=t0,f0,(0,{s,>2s,n-s,^-s,e-s:\n * Copyright © 2014-2019 Red Hat, Inc\n *\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU Lesser General Public\n * License as published by the Free Software Foundation; either\n * version 2.1 ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [3222, 82, 153], "buggy_code_start_loc": [3222, 11, 153], "filenames": ["common/flatpak-run.c", "tests/test-seccomp.sh", "tests/try-syscall.c"], "fixing_code_end_loc": [3227, 89, 163], "fixing_code_start_loc": [3223, 11, 154], "message": "Flatpak is a system for building, distributing, and runnin...
722
Determine whether the {function_name} code is vulnerable or not.
[ "/* vi:set et sw=2 sts=2 cin cino=t0,f0,(0,{s,>2s,n-s,^-s,e-s:\n * Copyright © 2014-2019 Red Hat, Inc\n *\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU Lesser General Public\n * License as published by the Free Software Foundation; either\n * version 2.1 ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [3222, 82, 153], "buggy_code_start_loc": [3222, 11, 153], "filenames": ["common/flatpak-run.c", "tests/test-seccomp.sh", "tests/try-syscall.c"], "fixing_code_end_loc": [3227, 89, 163], "fixing_code_start_loc": [3223, 11, 154], "message": "Flatpak is a system for building, distributing, and runnin...
722
Determine whether the {function_name} code is vulnerable or not.
[ "#!/bin/bash\n# Copyright 2021 Collabora Ltd.\n# SPDX-License-Identifier: LGPL-2.0-or-later", "set -euo pipefail", ". $(dirname $0)/libtest.sh", "skip_without_bwrap\n", "echo \"1..16\"", "\nsetup_repo\ninstall_repo", "cp -a \"$G_TEST_BUILDDIR/try-syscall\" \"$test_tmpdir/try-syscall\"", "# How this wo...
[ 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [3222, 82, 153], "buggy_code_start_loc": [3222, 11, 153], "filenames": ["common/flatpak-run.c", "tests/test-seccomp.sh", "tests/try-syscall.c"], "fixing_code_end_loc": [3227, 89, 163], "fixing_code_start_loc": [3223, 11, 154], "message": "Flatpak is a system for building, distributing, and runnin...
722
Determine whether the {function_name} code is vulnerable or not.
[ "#!/bin/bash\n# Copyright 2021 Collabora Ltd.\n# SPDX-License-Identifier: LGPL-2.0-or-later", "set -euo pipefail", ". $(dirname $0)/libtest.sh", "skip_without_bwrap\n", "echo \"1..18\"", "\nsetup_repo\ninstall_repo", "cp -a \"$G_TEST_BUILDDIR/try-syscall\" \"$test_tmpdir/try-syscall\"", "# How this wo...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [3222, 82, 153], "buggy_code_start_loc": [3222, 11, 153], "filenames": ["common/flatpak-run.c", "tests/test-seccomp.sh", "tests/try-syscall.c"], "fixing_code_end_loc": [3227, 89, 163], "fixing_code_start_loc": [3223, 11, 154], "message": "Flatpak is a system for building, distributing, and runnin...
722
Determine whether the {function_name} code is vulnerable or not.
[ "/* vi:set et sw=2 sts=2 cin cino=t0,f0,(0,{s,>2s,n-s,^-s,e-s:\n * Copyright 2021 Simon McVittie\n * SPDX-License-Identifier: LGPL-2.0-or-later\n *\n * Try one or more system calls that might have been blocked by a\n * seccomp filter. Return the last value of errno seen.\n *\n * In general, we pass a bad fd or poin...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [3222, 82, 153], "buggy_code_start_loc": [3222, 11, 153], "filenames": ["common/flatpak-run.c", "tests/test-seccomp.sh", "tests/try-syscall.c"], "fixing_code_end_loc": [3227, 89, 163], "fixing_code_start_loc": [3223, 11, 154], "message": "Flatpak is a system for building, distributing, and runnin...
722
Determine whether the {function_name} code is vulnerable or not.
[ "/* vi:set et sw=2 sts=2 cin cino=t0,f0,(0,{s,>2s,n-s,^-s,e-s:\n * Copyright 2021 Simon McVittie\n * SPDX-License-Identifier: LGPL-2.0-or-later\n *\n * Try one or more system calls that might have been blocked by a\n * seccomp filter. Return the last value of errno seen.\n *\n * In general, we pass a bad fd or poin...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [3222, 82, 153], "buggy_code_start_loc": [3222, 11, 153], "filenames": ["common/flatpak-run.c", "tests/test-seccomp.sh", "tests/try-syscall.c"], "fixing_code_end_loc": [3227, 89, 163], "fixing_code_start_loc": [3223, 11, 154], "message": "Flatpak is a system for building, distributing, and runnin...
722
Determine whether the {function_name} code is vulnerable or not.
[ "# Changelog", "", "\n## v0.13", "### Bug Fixes", "- Fix `slice` support by making it a configurable option", "## v0.12", "### New Features", "- Allow setting which **Systemd Slice** users' services should belong to.\n This lets admins set policy for all JupyterHub users in one go.\n [Thanks to [@ma...
[ 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [1, 6, 55, 85], "buggy_code_start_loc": [1, 5, 6, 68], "filenames": ["CHANGELOG.md", "setup.py", "systemdspawner/systemd.py", "tests/test_systemd.py"], "fixing_code_end_loc": [13, 6, 127, 104], "fixing_code_start_loc": [2, 5, 7, 68], "message": "jupyterhub-systemdspawner enables JupyterHub to spa...
723
Determine whether the {function_name} code is vulnerable or not.
[ "# Changelog", "\n## v0.15", "Fixes vulnerability [GHSA-cg54-gpgr-4rm6](https://github.com/jupyterhub/systemdspawner/security/advisories/GHSA-cg54-gpgr-4rm6) affecting all previous releases.", "- Use EnvironmentFile to pass environment variables to units.", "## v0.14", "- define entrypoints for JupyterHub...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [1, 6, 55, 85], "buggy_code_start_loc": [1, 5, 6, 68], "filenames": ["CHANGELOG.md", "setup.py", "systemdspawner/systemd.py", "tests/test_systemd.py"], "fixing_code_end_loc": [13, 6, 127, 104], "fixing_code_start_loc": [2, 5, 7, 68], "message": "jupyterhub-systemdspawner enables JupyterHub to spa...
723
Determine whether the {function_name} code is vulnerable or not.
[ "from setuptools import setup", "setup(\n name='jupyterhub-systemdspawner',", " version='0.14',", " description='JupyterHub Spawner using systemd for resource isolation',\n long_description='See https://github.com/jupyterhub/systemdspawner for more info',\n url='https://github.com/jupyterhub/sy...
[ 1, 1, 0, 1 ]
PreciseBugs
{"buggy_code_end_loc": [1, 6, 55, 85], "buggy_code_start_loc": [1, 5, 6, 68], "filenames": ["CHANGELOG.md", "setup.py", "systemdspawner/systemd.py", "tests/test_systemd.py"], "fixing_code_end_loc": [13, 6, 127, 104], "fixing_code_start_loc": [2, 5, 7, 68], "message": "jupyterhub-systemdspawner enables JupyterHub to spa...
723
Determine whether the {function_name} code is vulnerable or not.
[ "from setuptools import setup", "setup(\n name='jupyterhub-systemdspawner',", " version='0.15.0',", " description='JupyterHub Spawner using systemd for resource isolation',\n long_description='See https://github.com/jupyterhub/systemdspawner for more info',\n url='https://github.com/jupyterhub/...
[ 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [1, 6, 55, 85], "buggy_code_start_loc": [1, 5, 6, 68], "filenames": ["CHANGELOG.md", "setup.py", "systemdspawner/systemd.py", "tests/test_systemd.py"], "fixing_code_end_loc": [13, 6, 127, 104], "fixing_code_start_loc": [2, 5, 7, 68], "message": "jupyterhub-systemdspawner enables JupyterHub to spa...
723
Determine whether the {function_name} code is vulnerable or not.
[ "\"\"\"\nSystemd service utilities.", "Contains functions to start, stop & poll systemd services.\nProbably not very useful outside this spawner.\n\"\"\"", "", "import asyncio", "", "import shlex", "", "", "async def start_transient_service(\n unit_name,\n cmd,\n args,\n working_dir,\n ...
[ 1, 1, 0, 1, 0, 1, 0, 1, 1, 0, 1, 1, 0, 1, 1, 0, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [1, 6, 55, 85], "buggy_code_start_loc": [1, 5, 6, 68], "filenames": ["CHANGELOG.md", "setup.py", "systemdspawner/systemd.py", "tests/test_systemd.py"], "fixing_code_end_loc": [13, 6, 127, 104], "fixing_code_start_loc": [2, 5, 7, 68], "message": "jupyterhub-systemdspawner enables JupyterHub to spa...
723
Determine whether the {function_name} code is vulnerable or not.
[ "\"\"\"\nSystemd service utilities.", "Contains functions to start, stop & poll systemd services.\nProbably not very useful outside this spawner.\n\"\"\"", "", "import asyncio", "import os\nimport re", "import shlex", "import warnings", "# light validation of environment variable keys\nenv_pat = re.co...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [1, 6, 55, 85], "buggy_code_start_loc": [1, 5, 6, 68], "filenames": ["CHANGELOG.md", "setup.py", "systemdspawner/systemd.py", "tests/test_systemd.py"], "fixing_code_end_loc": [13, 6, 127, 104], "fixing_code_start_loc": [2, 5, 7, 68], "message": "jupyterhub-systemdspawner enables JupyterHub to spa...
723
Determine whether the {function_name} code is vulnerable or not.
[ "\"\"\"\nTest systemd wrapper utilities.", "Must run as root.\n\"\"\"\nimport tempfile\nfrom systemdspawner import systemd\nimport pytest\nimport asyncio\nimport os\nimport time", "\n@pytest.mark.asyncio\nasync def test_simple_start():\n unit_name = 'systemdspawner-unittest-' + str(time.time())\n await sy...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 0, 0, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [1, 6, 55, 85], "buggy_code_start_loc": [1, 5, 6, 68], "filenames": ["CHANGELOG.md", "setup.py", "systemdspawner/systemd.py", "tests/test_systemd.py"], "fixing_code_end_loc": [13, 6, 127, 104], "fixing_code_start_loc": [2, 5, 7, 68], "message": "jupyterhub-systemdspawner enables JupyterHub to spa...
723
Determine whether the {function_name} code is vulnerable or not.
[ "\"\"\"\nTest systemd wrapper utilities.", "Must run as root.\n\"\"\"\nimport tempfile\nfrom systemdspawner import systemd\nimport pytest\nimport asyncio\nimport os\nimport time", "\n@pytest.mark.asyncio\nasync def test_simple_start():\n unit_name = 'systemdspawner-unittest-' + str(time.time())\n await sy...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [1, 6, 55, 85], "buggy_code_start_loc": [1, 5, 6, 68], "filenames": ["CHANGELOG.md", "setup.py", "systemdspawner/systemd.py", "tests/test_systemd.py"], "fixing_code_end_loc": [13, 6, 127, 104], "fixing_code_start_loc": [2, 5, 7, 68], "message": "jupyterhub-systemdspawner enables JupyterHub to spa...
723
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\n/*\n* Bitstorm 2 - A small and fast Bittorrent tracker\n* Copyright 2011 Peter Caprioli\n*\n* This program is free software: you can redistribute it and/or modify\n* it under the terms of the GNU General Public License as published by\n* the Free Software Foundation, either version 3 of the License, or\n* (...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [117], "buggy_code_start_loc": [111], "filenames": ["announce.php"], "fixing_code_end_loc": [117], "fixing_code_start_loc": [111], "message": "A vulnerability classified as critical was found in ananich bitstorm. Affected by this vulnerability is an unknown functionality of the file announce.php....
724
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\n/*\n* Bitstorm 2 - A small and fast Bittorrent tracker\n* Copyright 2011 Peter Caprioli\n*\n* This program is free software: you can redistribute it and/or modify\n* it under the terms of the GNU General Public License as published by\n* the Free Software Foundation, either version 3 of the License, or\n* (...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [117], "buggy_code_start_loc": [111], "filenames": ["announce.php"], "fixing_code_end_loc": [117], "fixing_code_start_loc": [111], "message": "A vulnerability classified as critical was found in ananich bitstorm. Affected by this vulnerability is an unknown functionality of the file announce.php....
724
Determine whether the {function_name} code is vulnerable or not.
[ "Version 1.0.47 (unreleased)\n---------------------------", "New features:", "* Vietnamese translation", "", "\nVersion 1.0.46 (August 13, 2017)\n--------------------------------", "Security Issues:", "* Fix two privilege escalation issues: a standard user could reset the password \nof another user (inc...
[ 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [6, 69, 111, 157, 162, 186, 155, 67, 127, 208, 51, 7, 9, 9, 7, 10, 8, 10, 7, 11, 13, 7, 8, 8, 11, 7], "buggy_code_start_loc": [6, 48, 37, 157, 15, 63, 61, 67, 4, 6, 51, 6, 8, 8, 6, 7, 6, 7, 6, 8, 12, 6, 6, 5, 6, 6], "filenames": ["ChangeLog", "app/Controller/ActionController.php", "app/Controller...
725
Determine whether the {function_name} code is vulnerable or not.
[ "Version 1.0.47 (unreleased)\n---------------------------", "New features:", "* Vietnamese translation", "\nSecurity Issues:", "* Avoid people to alter other project resources by changing form data", "\nVersion 1.0.46 (August 13, 2017)\n--------------------------------", "Security Issues:", "* Fix two...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [6, 69, 111, 157, 162, 186, 155, 67, 127, 208, 51, 7, 9, 9, 7, 10, 8, 10, 7, 11, 13, 7, 8, 8, 11, 7], "buggy_code_start_loc": [6, 48, 37, 157, 15, 63, 61, 67, 4, 6, 51, 6, 8, 8, 6, 7, 6, 7, 6, 8, 12, 6, 6, 5, 6, 6], "filenames": ["ChangeLog", "app/Controller/ActionController.php", "app/Controller...
725
Determine whether the {function_name} code is vulnerable or not.
[ "<?php", "namespace Kanboard\\Controller;", "/**\n * Automatic Actions Controller\n *\n * @package Kanboard\\Controller\n * @author Frederic Guillot\n */\nclass ActionController extends BaseController\n{\n /**\n * List of automatic actions for a given project\n *\n * @access public\n */\n ...
[ 1, 1, 1, 1, 1, 0, 1, 0, 1, 1, 0, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [6, 69, 111, 157, 162, 186, 155, 67, 127, 208, 51, 7, 9, 9, 7, 10, 8, 10, 7, 11, 13, 7, 8, 8, 11, 7], "buggy_code_start_loc": [6, 48, 37, 157, 15, 63, 61, 67, 4, 6, 51, 6, 8, 8, 6, 7, 6, 7, 6, 8, 12, 6, 6, 5, 6, 6], "filenames": ["ChangeLog", "app/Controller/ActionController.php", "app/Controller...
725
Determine whether the {function_name} code is vulnerable or not.
[ "<?php", "namespace Kanboard\\Controller;", "/**\n * Automatic Actions Controller\n *\n * @package Kanboard\\Controller\n * @author Frederic Guillot\n */\nclass ActionController extends BaseController\n{\n /**\n * List of automatic actions for a given project\n *\n * @access public\n */\n ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [6, 69, 111, 157, 162, 186, 155, 67, 127, 208, 51, 7, 9, 9, 7, 10, 8, 10, 7, 11, 13, 7, 8, 8, 11, 7], "buggy_code_start_loc": [6, 48, 37, 157, 15, 63, 61, 67, 4, 6, 51, 6, 8, 8, 6, 7, 6, 7, 6, 8, 12, 6, 6, 5, 6, 6], "filenames": ["ChangeLog", "app/Controller/ActionController.php", "app/Controller...
725
Determine whether the {function_name} code is vulnerable or not.
[ "<?php", "namespace Kanboard\\Controller;", "/**\n * Action Creation Controller\n *\n * @package Kanboard\\Controller\n * @author Frederic Guillot\n */\nclass ActionCreationController extends BaseController\n{\n /**\n * Show the form (step 1)\n *\n * @access public\n */\n public function ...
[ 1, 1, 1, 1, 1, 0, 1, 0, 1, 1, 1, 0, 1, 0, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [6, 69, 111, 157, 162, 186, 155, 67, 127, 208, 51, 7, 9, 9, 7, 10, 8, 10, 7, 11, 13, 7, 8, 8, 11, 7], "buggy_code_start_loc": [6, 48, 37, 157, 15, 63, 61, 67, 4, 6, 51, 6, 8, 8, 6, 7, 6, 7, 6, 8, 12, 6, 6, 5, 6, 6], "filenames": ["ChangeLog", "app/Controller/ActionController.php", "app/Controller...
725
Determine whether the {function_name} code is vulnerable or not.
[ "<?php", "namespace Kanboard\\Controller;", "/**\n * Action Creation Controller\n *\n * @package Kanboard\\Controller\n * @author Frederic Guillot\n */\nclass ActionCreationController extends BaseController\n{\n /**\n * Show the form (step 1)\n *\n * @access public\n */\n public function ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [6, 69, 111, 157, 162, 186, 155, 67, 127, 208, 51, 7, 9, 9, 7, 10, 8, 10, 7, 11, 13, 7, 8, 8, 11, 7], "buggy_code_start_loc": [6, 48, 37, 157, 15, 63, 61, 67, 4, 6, 51, 6, 8, 8, 6, 7, 6, 7, 6, 8, 12, 6, 6, 5, 6, 6], "filenames": ["ChangeLog", "app/Controller/ActionController.php", "app/Controller...
725
Determine whether the {function_name} code is vulnerable or not.
[ "<?php", "namespace Kanboard\\Controller;", "use Kanboard\\Core\\Base;\nuse Kanboard\\Core\\Controller\\AccessForbiddenException;\nuse Kanboard\\Core\\Controller\\PageNotFoundException;", "/**\n * Base Controller\n *\n * @package Kanboard\\Controller\n * @author Frederic Guillot\n */\nabstract class BaseCo...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1 ]
PreciseBugs
{"buggy_code_end_loc": [6, 69, 111, 157, 162, 186, 155, 67, 127, 208, 51, 7, 9, 9, 7, 10, 8, 10, 7, 11, 13, 7, 8, 8, 11, 7], "buggy_code_start_loc": [6, 48, 37, 157, 15, 63, 61, 67, 4, 6, 51, 6, 8, 8, 6, 7, 6, 7, 6, 8, 12, 6, 6, 5, 6, 6], "filenames": ["ChangeLog", "app/Controller/ActionController.php", "app/Controller...
725
Determine whether the {function_name} code is vulnerable or not.
[ "<?php", "namespace Kanboard\\Controller;", "use Kanboard\\Core\\Base;\nuse Kanboard\\Core\\Controller\\AccessForbiddenException;\nuse Kanboard\\Core\\Controller\\PageNotFoundException;", "/**\n * Base Controller\n *\n * @package Kanboard\\Controller\n * @author Frederic Guillot\n */\nabstract class BaseCo...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [6, 69, 111, 157, 162, 186, 155, 67, 127, 208, 51, 7, 9, 9, 7, 10, 8, 10, 7, 11, 13, 7, 8, 8, 11, 7], "buggy_code_start_loc": [6, 48, 37, 157, 15, 63, 61, 67, 4, 6, 51, 6, 8, 8, 6, 7, 6, 7, 6, 8, 12, 6, 6, 5, 6, 6], "filenames": ["ChangeLog", "app/Controller/ActionController.php", "app/Controller...
725
Determine whether the {function_name} code is vulnerable or not.
[ "<?php", "namespace Kanboard\\Controller;", "use Kanboard\\Core\\Controller\\PageNotFoundException;", "/**\n * Category Controller\n *\n * @package Kanboard\\Controller\n * @author Frederic Guillot\n */\nclass CategoryController extends BaseController\n{", " /**\n * Get the category (common method b...
[ 1, 1, 1, 1, 0, 0, 0, 1, 1, 1, 1, 1, 0, 1, 0, 1, 1, 1, 1, 0, 1, 1, 0, 1, 0, 1, 1, 1, 1, 0, 1, 1, 0, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [6, 69, 111, 157, 162, 186, 155, 67, 127, 208, 51, 7, 9, 9, 7, 10, 8, 10, 7, 11, 13, 7, 8, 8, 11, 7], "buggy_code_start_loc": [6, 48, 37, 157, 15, 63, 61, 67, 4, 6, 51, 6, 8, 8, 6, 7, 6, 7, 6, 8, 12, 6, 6, 5, 6, 6], "filenames": ["ChangeLog", "app/Controller/ActionController.php", "app/Controller...
725
Determine whether the {function_name} code is vulnerable or not.
[ "<?php", "namespace Kanboard\\Controller;", "use Kanboard\\Core\\Controller\\PageNotFoundException;", "/**\n * Category Controller\n *\n * @package Kanboard\\Controller\n * @author Frederic Guillot\n */\nclass CategoryController extends BaseController\n{", "", " /**\n * List of categories for a gi...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [6, 69, 111, 157, 162, 186, 155, 67, 127, 208, 51, 7, 9, 9, 7, 10, 8, 10, 7, 11, 13, 7, 8, 8, 11, 7], "buggy_code_start_loc": [6, 48, 37, 157, 15, 63, 61, 67, 4, 6, 51, 6, 8, 8, 6, 7, 6, 7, 6, 8, 12, 6, 6, 5, 6, 6], "filenames": ["ChangeLog", "app/Controller/ActionController.php", "app/Controller...
725
Determine whether the {function_name} code is vulnerable or not.
[ "<?php", "namespace Kanboard\\Controller;", "use Kanboard\\Core\\Controller\\AccessForbiddenException;", "/**\n * Column Controller\n *\n * @package Kanboard\\Controller\n * @author Frederic Guillot\n */\nclass ColumnController extends BaseController\n{\n /**\n * Display columns list\n *\n *...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 0, 1, 1, 0, 1, 0, 1, 1, 1, 1, 1, 1, 1, 0, 1, 0, 1, 1, 0, 1, 0, 1, 0, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [6, 69, 111, 157, 162, 186, 155, 67, 127, 208, 51, 7, 9, 9, 7, 10, 8, 10, 7, 11, 13, 7, 8, 8, 11, 7], "buggy_code_start_loc": [6, 48, 37, 157, 15, 63, 61, 67, 4, 6, 51, 6, 8, 8, 6, 7, 6, 7, 6, 8, 12, 6, 6, 5, 6, 6], "filenames": ["ChangeLog", "app/Controller/ActionController.php", "app/Controller...
725
Determine whether the {function_name} code is vulnerable or not.
[ "<?php", "namespace Kanboard\\Controller;", "use Kanboard\\Core\\Controller\\AccessForbiddenException;", "/**\n * Column Controller\n *\n * @package Kanboard\\Controller\n * @author Frederic Guillot\n */\nclass ColumnController extends BaseController\n{\n /**\n * Display columns list\n *\n *...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [6, 69, 111, 157, 162, 186, 155, 67, 127, 208, 51, 7, 9, 9, 7, 10, 8, 10, 7, 11, 13, 7, 8, 8, 11, 7], "buggy_code_start_loc": [6, 48, 37, 157, 15, 63, 61, 67, 4, 6, 51, 6, 8, 8, 6, 7, 6, 7, 6, 8, 12, 6, 6, 5, 6, 6], "filenames": ["ChangeLog", "app/Controller/ActionController.php", "app/Controller...
725
Determine whether the {function_name} code is vulnerable or not.
[ "<?php", "namespace Kanboard\\Controller;", "use Kanboard\\Core\\Controller\\AccessForbiddenException;\nuse Kanboard\\Core\\Security\\Role;", "/**\n * Custom Filter Controller\n *\n * @package Kanboard\\Controller\n * @author Timo Litzbarski\n * @author Frederic Guillot\n */\nclass CustomFilterController ex...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 0, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [6, 69, 111, 157, 162, 186, 155, 67, 127, 208, 51, 7, 9, 9, 7, 10, 8, 10, 7, 11, 13, 7, 8, 8, 11, 7], "buggy_code_start_loc": [6, 48, 37, 157, 15, 63, 61, 67, 4, 6, 51, 6, 8, 8, 6, 7, 6, 7, 6, 8, 12, 6, 6, 5, 6, 6], "filenames": ["ChangeLog", "app/Controller/ActionController.php", "app/Controller...
725
Determine whether the {function_name} code is vulnerable or not.
[ "<?php", "namespace Kanboard\\Controller;", "use Kanboard\\Core\\Controller\\AccessForbiddenException;\nuse Kanboard\\Core\\Security\\Role;", "/**\n * Custom Filter Controller\n *\n * @package Kanboard\\Controller\n * @author Timo Litzbarski\n * @author Frederic Guillot\n */\nclass CustomFilterController ex...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [6, 69, 111, 157, 162, 186, 155, 67, 127, 208, 51, 7, 9, 9, 7, 10, 8, 10, 7, 11, 13, 7, 8, 8, 11, 7], "buggy_code_start_loc": [6, 48, 37, 157, 15, 63, 61, 67, 4, 6, 51, 6, 8, 8, 6, 7, 6, 7, 6, 8, 12, 6, 6, 5, 6, 6], "filenames": ["ChangeLog", "app/Controller/ActionController.php", "app/Controller...
725