prompt stringclasses 1
value | completions listlengths 1 63.8k | labels listlengths 1 63.8k | source stringclasses 1
value | other_info stringlengths 2.06k 101k | index int64 0 6.83k |
|---|---|---|---|---|---|
Determine whether the {function_name} code is vulnerable or not. | [
"<div class=\"col-lg-12\">\n <div class=\"col-lg-3 center-block pull-none text-center\">\n <a class=\"btn btn-default\" href=\"<%= url '/'%>\">Back to Gem Index</a>\n </div>\n</div>",
"<div class=\"col-lg-12\">\n <% gem.by_name do |name, versions| %>\n <div class=\"col-lg-6 center-block pull-none\">\n ... | [
1,
1,
1,
1,
0,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [5, 273, 35], "buggy_code_start_loc": [4, 2, 34], "filenames": ["Gemfile.lock", "lib/gemirro/server.rb", "views/gem.erb"], "fixing_code_end_loc": [5, 285, 35], "fixing_code_start_loc": [4, 3, 34], "message": "Stored cross-site scripting (XSS) vulnerability in Gemirro before 0.16.0 allows attacker... | 707 |
Determine whether the {function_name} code is vulnerable or not. | [
"<div class=\"col-lg-12\">\n <div class=\"col-lg-3 center-block pull-none text-center\">\n <a class=\"btn btn-default\" href=\"<%= url '/'%>\">Back to Gem Index</a>\n </div>\n</div>",
"<div class=\"col-lg-12\">\n <% gem.by_name do |name, versions| %>\n <div class=\"col-lg-6 center-block pull-none\">\n ... | [
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [5, 273, 35], "buggy_code_start_loc": [4, 2, 34], "filenames": ["Gemfile.lock", "lib/gemirro/server.rb", "views/gem.erb"], "fixing_code_end_loc": [5, 285, 35], "fixing_code_start_loc": [4, 3, 34], "message": "Stored cross-site scripting (XSS) vulnerability in Gemirro before 0.16.0 allows attacker... | 707 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Routines for driver control interface\n * Copyright (c) by Jaroslav Kysela <perex@perex.cz>\n *\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free Software Foundation; either version 2 of ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
0,
1,
0,
1,
1,
1,
1,
0,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1338], "buggy_code_start_loc": [332], "filenames": ["sound/core/control.c"], "fixing_code_end_loc": [1343], "fixing_code_start_loc": [333], "message": "sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not ensure possession of a read/write lock, which... | 708 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Routines for driver control interface\n * Copyright (c) by Jaroslav Kysela <perex@perex.cz>\n *\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free Software Foundation; either version 2 of ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1338], "buggy_code_start_loc": [332], "filenames": ["sound/core/control.c"], "fixing_code_end_loc": [1343], "fixing_code_start_loc": [333], "message": "sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not ensure possession of a read/write lock, which... | 708 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/**\n * Patient matching and selection dialog.\n *\n * @package OpenEMR\n * @link https://www.open-emr.org\n * @author Rod Roark <rod@sunsetsystems.com>\n * @author Brady Miller <brady.g.miller@gmail.com>\n * @copyright Copyright (c) 2013-2015 Rod Roark <rod@sunsetsystems.com>\n * @copyrigh... | [
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [56, 333, 169, 174, 105, 286], "buggy_code_start_loc": [55, 332, 139, 112, 104, 280], "filenames": ["interface/orders/patient_match_dialog.php", "interface/patient_file/report/patient_report.php", "interface/usergroup/mfa_registrations.php", "interface/usergroup/mfa_totp.php", "interface/usergrou... | 709 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/**\n * Patient matching and selection dialog.\n *\n * @package OpenEMR\n * @link https://www.open-emr.org\n * @author Rod Roark <rod@sunsetsystems.com>\n * @author Brady Miller <brady.g.miller@gmail.com>\n * @copyright Copyright (c) 2013-2015 Rod Roark <rod@sunsetsystems.com>\n * @copyrigh... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [56, 333, 169, 174, 105, 286], "buggy_code_start_loc": [55, 332, 139, 112, 104, 280], "filenames": ["interface/orders/patient_match_dialog.php", "interface/patient_file/report/patient_report.php", "interface/usergroup/mfa_registrations.php", "interface/usergroup/mfa_totp.php", "interface/usergrou... | 709 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/**\n * Patient report\n *\n * @package OpenEMR\n * @link http://www.open-emr.org\n * @author Brady Miller <brady.g.miller@gmail.com>\n * @copyright Copyright (c) 2017-2018 Brady Miller <brady.g.miller@gmail.com>\n * @author Stephen Nielson <stephen@nielson.org>\n * @copyright Copyright (c)... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [56, 333, 169, 174, 105, 286], "buggy_code_start_loc": [55, 332, 139, 112, 104, 280], "filenames": ["interface/orders/patient_match_dialog.php", "interface/patient_file/report/patient_report.php", "interface/usergroup/mfa_registrations.php", "interface/usergroup/mfa_totp.php", "interface/usergrou... | 709 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/**\n * Patient report\n *\n * @package OpenEMR\n * @link http://www.open-emr.org\n * @author Brady Miller <brady.g.miller@gmail.com>\n * @copyright Copyright (c) 2017-2018 Brady Miller <brady.g.miller@gmail.com>\n * @author Stephen Nielson <stephen@nielson.org>\n * @copyright Copyright (c)... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [56, 333, 169, 174, 105, 286], "buggy_code_start_loc": [55, 332, 139, 112, 104, 280], "filenames": ["interface/orders/patient_match_dialog.php", "interface/patient_file/report/patient_report.php", "interface/usergroup/mfa_registrations.php", "interface/usergroup/mfa_totp.php", "interface/usergrou... | 709 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/**\n * Multi-Factor Authentication Management\n *\n * @package OpenEMR\n * @link http://www.open-emr.org\n * @author Rod Roark <rod@sunsetsystems.com>\n * @author Brady Miller <brady.g.miller@gmail.com>\n * @copyright Copyright (c) 2018 Rod Roark <rod@sunsetsystems.com>\n * @copyright Copy... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [56, 333, 169, 174, 105, 286], "buggy_code_start_loc": [55, 332, 139, 112, 104, 280], "filenames": ["interface/orders/patient_match_dialog.php", "interface/patient_file/report/patient_report.php", "interface/usergroup/mfa_registrations.php", "interface/usergroup/mfa_totp.php", "interface/usergrou... | 709 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/**\n * Multi-Factor Authentication Management\n *\n * @package OpenEMR\n * @link http://www.open-emr.org\n * @author Rod Roark <rod@sunsetsystems.com>\n * @author Brady Miller <brady.g.miller@gmail.com>\n * @copyright Copyright (c) 2018 Rod Roark <rod@sunsetsystems.com>\n * @copyright Copy... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [56, 333, 169, 174, 105, 286], "buggy_code_start_loc": [55, 332, 139, 112, 104, 280], "filenames": ["interface/orders/patient_match_dialog.php", "interface/patient_file/report/patient_report.php", "interface/usergroup/mfa_registrations.php", "interface/usergroup/mfa_totp.php", "interface/usergrou... | 709 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/**\n * App Based TOTP Support\n *\n * @package OpenEMR\n * @link http://www.open-emr.org\n * @author Anthony Zullo <anthonykzullo@gmail.com>\n * @author Rod Roark <rod@sunsetsystems.com>\n * @author Brady Miller <brady.g.miller@gmail.com>\n * @copyright Copyright (c) 2019 Anthony Zullo ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [56, 333, 169, 174, 105, 286], "buggy_code_start_loc": [55, 332, 139, 112, 104, 280], "filenames": ["interface/orders/patient_match_dialog.php", "interface/patient_file/report/patient_report.php", "interface/usergroup/mfa_registrations.php", "interface/usergroup/mfa_totp.php", "interface/usergrou... | 709 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/**\n * App Based TOTP Support\n *\n * @package OpenEMR\n * @link http://www.open-emr.org\n * @author Anthony Zullo <anthonykzullo@gmail.com>\n * @author Rod Roark <rod@sunsetsystems.com>\n * @author Brady Miller <brady.g.miller@gmail.com>\n * @copyright Copyright (c) 2019 Anthony Zullo ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [56, 333, 169, 174, 105, 286], "buggy_code_start_loc": [55, 332, 139, 112, 104, 280], "filenames": ["interface/orders/patient_match_dialog.php", "interface/patient_file/report/patient_report.php", "interface/usergroup/mfa_registrations.php", "interface/usergroup/mfa_totp.php", "interface/usergrou... | 709 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/**\n * FIDO U2F Support Module\n *\n * @package OpenEMR\n * @link http://www.open-emr.org\n * @author Rod Roark <rod@sunsetsystems.com>\n * @author Brady Miller <brady.g.miller@gmail.com>\n * @copyright Copyright (c) 2018 Rod Roark <rod@sunsetsystems.com>\n * @copyright Copyright (c) 2018 ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [56, 333, 169, 174, 105, 286], "buggy_code_start_loc": [55, 332, 139, 112, 104, 280], "filenames": ["interface/orders/patient_match_dialog.php", "interface/patient_file/report/patient_report.php", "interface/usergroup/mfa_registrations.php", "interface/usergroup/mfa_totp.php", "interface/usergrou... | 709 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/**\n * FIDO U2F Support Module\n *\n * @package OpenEMR\n * @link http://www.open-emr.org\n * @author Rod Roark <rod@sunsetsystems.com>\n * @author Brady Miller <brady.g.miller@gmail.com>\n * @copyright Copyright (c) 2018 Rod Roark <rod@sunsetsystems.com>\n * @copyright Copyright (c) 2018 ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [56, 333, 169, 174, 105, 286], "buggy_code_start_loc": [55, 332, 139, 112, 104, 280], "filenames": ["interface/orders/patient_match_dialog.php", "interface/patient_file/report/patient_report.php", "interface/usergroup/mfa_registrations.php", "interface/usergroup/mfa_totp.php", "interface/usergrou... | 709 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/**\n * This script Assign acl 'Emergency login'.\n *\n * @package OpenEMR\n * @link http://www.open-emr.org\n * @author Roberto Vasquez <robertogagliotta@gmail.com>\n * @author Brady Miller <brady.g.miller@gmail.com>\n * @author Daniel Pflieger <daniel@mi-squared.com> <daniel@growlingfl... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [56, 333, 169, 174, 105, 286], "buggy_code_start_loc": [55, 332, 139, 112, 104, 280], "filenames": ["interface/orders/patient_match_dialog.php", "interface/patient_file/report/patient_report.php", "interface/usergroup/mfa_registrations.php", "interface/usergroup/mfa_totp.php", "interface/usergrou... | 709 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/**\n * This script Assign acl 'Emergency login'.\n *\n * @package OpenEMR\n * @link http://www.open-emr.org\n * @author Roberto Vasquez <robertogagliotta@gmail.com>\n * @author Brady Miller <brady.g.miller@gmail.com>\n * @author Daniel Pflieger <daniel@mi-squared.com> <daniel@growlingfl... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [56, 333, 169, 174, 105, 286], "buggy_code_start_loc": [55, 332, 139, 112, 104, 280], "filenames": ["interface/orders/patient_match_dialog.php", "interface/patient_file/report/patient_report.php", "interface/usergroup/mfa_registrations.php", "interface/usergroup/mfa_totp.php", "interface/usergrou... | 709 |
Determine whether the {function_name} code is vulnerable or not. | [
"var Utils = require(\"./util\");\nvar fs = Utils.FileSystem.require(),\n pth = require(\"path\");",
"fs.existsSync = fs.existsSync || pth.existsSync;",
"var ZipEntry = require(\"./zipEntry\"),\n ZipFile = require(\"./zipFile\");",
"var isWin = /^win/.test(process.platform);",
"\nmodule.exports = fun... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [471], "buggy_code_start_loc": [356], "filenames": ["adm-zip.js"], "fixing_code_end_loc": [483], "fixing_code_start_loc": [357], "message": "adm-zip npm library before 0.4.9 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in a Zip arc... | 710 |
Determine whether the {function_name} code is vulnerable or not. | [
"var Utils = require(\"./util\");\nvar fs = Utils.FileSystem.require(),\n pth = require(\"path\");",
"fs.existsSync = fs.existsSync || pth.existsSync;",
"var ZipEntry = require(\"./zipEntry\"),\n ZipFile = require(\"./zipFile\");",
"var isWin = /^win/.test(process.platform);",
"\nmodule.exports = fun... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [471], "buggy_code_start_loc": [356], "filenames": ["adm-zip.js"], "fixing_code_end_loc": [483], "fixing_code_start_loc": [357], "message": "adm-zip npm library before 0.4.9 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in a Zip arc... | 710 |
Determine whether the {function_name} code is vulnerable or not. | [
"# Changes in HTMLDOC v1.9.16\n",
"",
"- Updated the GUI interface for current display fonts.",
"- Fixed some minor Coverity warnings.",
"",
"# Changes in HTMLDOC v1.9.15",
"- Fixed a potential heap overflow bug with GIF images (Issue #461)\n- Fixed a potential double-free bug with PNG images (Issue #46... | [
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [5, 1599], "buggy_code_start_loc": [2, 26], "filenames": ["CHANGES.md", "htmldoc/image.cxx"], "fixing_code_end_loc": [5, 1619], "fixing_code_start_loc": [3, 27], "message": "There is a vulnerability in htmldoc 1.9.16. In image_load_jpeg function image.cxx when it calls malloc,'img->width' and 'im... | 711 |
Determine whether the {function_name} code is vulnerable or not. | [
"# Changes in HTMLDOC v1.9.16\n",
"- Fixed a potential image overflow bug with JPEG and PNG images (Issue #471)\n- Fixed some minor Coverity warnings.",
"- Updated the GUI interface for current display fonts.",
"",
"",
"# Changes in HTMLDOC v1.9.15",
"- Fixed a potential heap overflow bug with GIF image... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [5, 1599], "buggy_code_start_loc": [2, 26], "filenames": ["CHANGES.md", "htmldoc/image.cxx"], "fixing_code_end_loc": [5, 1619], "fixing_code_start_loc": [3, 27], "message": "There is a vulnerability in htmldoc 1.9.16. In image_load_jpeg function image.cxx when it calls malloc,'img->width' and 'im... | 711 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Image handling routines for HTMLDOC, a HTML document processing program.\n *\n * Copyright © 2011-2022 by Michael R Sweet.\n * Copyright © 1997-2010 by Easy Software Products. All rights reserved.\n *\n * This program is free software. Distribution and use rights are outlined in\n * the file \"COPYING\".\... | [
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [5, 1599], "buggy_code_start_loc": [2, 26], "filenames": ["CHANGES.md", "htmldoc/image.cxx"], "fixing_code_end_loc": [5, 1619], "fixing_code_start_loc": [3, 27], "message": "There is a vulnerability in htmldoc 1.9.16. In image_load_jpeg function image.cxx when it calls malloc,'img->width' and 'im... | 711 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Image handling routines for HTMLDOC, a HTML document processing program.\n *\n * Copyright © 2011-2022 by Michael R Sweet.\n * Copyright © 1997-2010 by Easy Software Products. All rights reserved.\n *\n * This program is free software. Distribution and use rights are outlined in\n * the file \"COPYING\".\... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [5, 1599], "buggy_code_start_loc": [2, 26], "filenames": ["CHANGES.md", "htmldoc/image.cxx"], "fixing_code_end_loc": [5, 1619], "fixing_code_start_loc": [3, 27], "message": "There is a vulnerability in htmldoc 1.9.16. In image_load_jpeg function image.cxx when it calls malloc,'img->width' and 'im... | 711 |
Determine whether the {function_name} code is vulnerable or not. | [
"package auth",
"import (\n\t\"time\"",
"\t\"github.com/golang-jwt/jwt\"",
"",
"\t\"github.com/sipcapture/homer-app/model\"\n\t\"github.com/sipcapture/homer-app/utils/logger\"\n)",
"// jwt token claims which contains info regarding user\ntype JwtUserClaim struct {\n\tUserName string `json:\"usernam... | [
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [53, 4, 44, 105, 1167, 5], "buggy_code_start_loc": [6, 2, 44, 105, 132, 4], "filenames": ["auth/claims.go", "auth/constants.go", "config/config.go", "etc/webapp_config.json", "main.go", "version.go"], "fixing_code_end_loc": [54, 1, 49, 107, 1193, 5], "fixing_code_start_loc": [7, 1, 45, 106, 133, ... | 712 |
Determine whether the {function_name} code is vulnerable or not. | [
"package auth",
"import (\n\t\"time\"",
"\t\"github.com/golang-jwt/jwt\"",
"\t\"github.com/sipcapture/homer-app/config\"",
"\t\"github.com/sipcapture/homer-app/model\"\n\t\"github.com/sipcapture/homer-app/utils/logger\"\n)",
"// jwt token claims which contains info regarding user\ntype JwtUserClaim struct... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [53, 4, 44, 105, 1167, 5], "buggy_code_start_loc": [6, 2, 44, 105, 132, 4], "filenames": ["auth/claims.go", "auth/constants.go", "config/config.go", "etc/webapp_config.json", "main.go", "version.go"], "fixing_code_end_loc": [54, 1, 49, 107, 1193, 5], "fixing_code_start_loc": [7, 1, 45, 106, 133, ... | 712 |
Determine whether the {function_name} code is vulnerable or not. | [
"package auth",
"\nconst JwtSecret = \"167f0db2-f83e-4baa-9736-d56064a5b415\"",
"\n/* our expire time */\nvar TokenExpiryTime = 1200",
"// token header\nconst TokenHeader = \"Auth-Token\""
] | [
1,
0,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [53, 4, 44, 105, 1167, 5], "buggy_code_start_loc": [6, 2, 44, 105, 132, 4], "filenames": ["auth/claims.go", "auth/constants.go", "config/config.go", "etc/webapp_config.json", "main.go", "version.go"], "fixing_code_end_loc": [54, 1, 49, 107, 1193, 5], "fixing_code_start_loc": [7, 1, 45, 106, 133, ... | 712 |
Determine whether the {function_name} code is vulnerable or not. | [
"package auth",
"",
"\n/* our expire time */\nvar TokenExpiryTime = 1200",
"// token header\nconst TokenHeader = \"Auth-Token\""
] | [
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [53, 4, 44, 105, 1167, 5], "buggy_code_start_loc": [6, 2, 44, 105, 132, 4], "filenames": ["auth/claims.go", "auth/constants.go", "config/config.go", "etc/webapp_config.json", "main.go", "version.go"], "fixing_code_end_loc": [54, 1, 49, 107, 1193, 5], "fixing_code_start_loc": [7, 1, 45, 106, 133, ... | 712 |
Determine whether the {function_name} code is vulnerable or not. | [
"package config",
"import (\n\t\"net/http\"",
"\t\"github.com/sipcapture/homer-app/model\"\n\t\"golang.org/x/oauth2\"\n)",
"var Setting HomerSettingServer",
"var OAuth2TokenMap map[string]model.OAuth2MapToken",
"type HomerSettingServer struct {\n\tMAIN_SETTINGS struct {\n\t\tIsolateQuery string `de... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [53, 4, 44, 105, 1167, 5], "buggy_code_start_loc": [6, 2, 44, 105, 132, 4], "filenames": ["auth/claims.go", "auth/constants.go", "config/config.go", "etc/webapp_config.json", "main.go", "version.go"], "fixing_code_end_loc": [54, 1, 49, 107, 1193, 5], "fixing_code_start_loc": [7, 1, 45, 106, 133, ... | 712 |
Determine whether the {function_name} code is vulnerable or not. | [
"package config",
"import (\n\t\"net/http\"",
"\t\"github.com/sipcapture/homer-app/model\"\n\t\"golang.org/x/oauth2\"\n)",
"var Setting HomerSettingServer",
"var OAuth2TokenMap map[string]model.OAuth2MapToken",
"type HomerSettingServer struct {\n\tMAIN_SETTINGS struct {\n\t\tIsolateQuery string `de... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [53, 4, 44, 105, 1167, 5], "buggy_code_start_loc": [6, 2, 44, 105, 132, 4], "filenames": ["auth/claims.go", "auth/constants.go", "config/config.go", "etc/webapp_config.json", "main.go", "version.go"], "fixing_code_end_loc": [54, 1, 49, 107, 1193, 5], "fixing_code_start_loc": [7, 1, 45, 106, 133, ... | 712 |
Determine whether the {function_name} code is vulnerable or not. | [
"{\n \"database_data\": {\n \"LocalNode\": {\n \"help\": \"Settings for PGSQL Database (data)\",\n \"node\": \"LocalNode\",\n \"user\": \"homer_user\",\n \"pass\": \"homer_password\",\n \"name\": \"homer_data\",\n \"keepalive\": true,\n \"host\": \"127.0.0.1\"\n }\n },\n ... | [
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [53, 4, 44, 105, 1167, 5], "buggy_code_start_loc": [6, 2, 44, 105, 132, 4], "filenames": ["auth/claims.go", "auth/constants.go", "config/config.go", "etc/webapp_config.json", "main.go", "version.go"], "fixing_code_end_loc": [54, 1, 49, 107, 1193, 5], "fixing_code_start_loc": [7, 1, 45, 106, 133, ... | 712 |
Determine whether the {function_name} code is vulnerable or not. | [
"{\n \"database_data\": {\n \"LocalNode\": {\n \"help\": \"Settings for PGSQL Database (data)\",\n \"node\": \"LocalNode\",\n \"user\": \"homer_user\",\n \"pass\": \"homer_password\",\n \"name\": \"homer_data\",\n \"keepalive\": true,\n \"host\": \"127.0.0.1\"\n }\n },\n ... | [
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [53, 4, 44, 105, 1167, 5], "buggy_code_start_loc": [6, 2, 44, 105, 132, 4], "filenames": ["auth/claims.go", "auth/constants.go", "config/config.go", "etc/webapp_config.json", "main.go", "version.go"], "fixing_code_end_loc": [54, 1, 49, 107, 1193, 5], "fixing_code_start_loc": [7, 1, 45, 106, 133, ... | 712 |
Determine whether the {function_name} code is vulnerable or not. | [
"// Homer-App\n//\n// Homer-App User interface for WEB AI\n//\n// Schemes: http, https\n// Host: localhost:9080\n// BasePath: /api/v3\n// Version: 1.1.2\n// License: AGPL https://www.gnu.org/licenses/agpl-3.0.en.html\n//\t Copyright: QXIP B.V. 2019-2020\n//\n// Consumes:\n// - applicat... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [53, 4, 44, 105, 1167, 5], "buggy_code_start_loc": [6, 2, 44, 105, 132, 4], "filenames": ["auth/claims.go", "auth/constants.go", "config/config.go", "etc/webapp_config.json", "main.go", "version.go"], "fixing_code_end_loc": [54, 1, 49, 107, 1193, 5], "fixing_code_start_loc": [7, 1, 45, 106, 133, ... | 712 |
Determine whether the {function_name} code is vulnerable or not. | [
"// Homer-App\n//\n// Homer-App User interface for WEB AI\n//\n// Schemes: http, https\n// Host: localhost:9080\n// BasePath: /api/v3\n// Version: 1.1.2\n// License: AGPL https://www.gnu.org/licenses/agpl-3.0.en.html\n//\t Copyright: QXIP B.V. 2019-2020\n//\n// Consumes:\n// - applicat... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [53, 4, 44, 105, 1167, 5], "buggy_code_start_loc": [6, 2, 44, 105, 132, 4], "filenames": ["auth/claims.go", "auth/constants.go", "config/config.go", "etc/webapp_config.json", "main.go", "version.go"], "fixing_code_end_loc": [54, 1, 49, 107, 1193, 5], "fixing_code_start_loc": [7, 1, 45, 106, 133, ... | 712 |
Determine whether the {function_name} code is vulnerable or not. | [
"package main",
"//VERSION",
"var VERSION_APPLICATION = \"1.4.27\"",
"\n//NAME\nvar NAME_APPLICATION = \"homer-app\"",
"func getVersion() string {\n\treturn VERSION_APPLICATION\n}",
"func getName() string {\n\treturn NAME_APPLICATION\n}"
] | [
1,
1,
0,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [53, 4, 44, 105, 1167, 5], "buggy_code_start_loc": [6, 2, 44, 105, 132, 4], "filenames": ["auth/claims.go", "auth/constants.go", "config/config.go", "etc/webapp_config.json", "main.go", "version.go"], "fixing_code_end_loc": [54, 1, 49, 107, 1193, 5], "fixing_code_start_loc": [7, 1, 45, 106, 133, ... | 712 |
Determine whether the {function_name} code is vulnerable or not. | [
"package main",
"//VERSION",
"var VERSION_APPLICATION = \"1.4.28\"",
"\n//NAME\nvar NAME_APPLICATION = \"homer-app\"",
"func getVersion() string {\n\treturn VERSION_APPLICATION\n}",
"func getName() string {\n\treturn NAME_APPLICATION\n}"
] | [
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [53, 4, 44, 105, 1167, 5], "buggy_code_start_loc": [6, 2, 44, 105, 132, 4], "filenames": ["auth/claims.go", "auth/constants.go", "config/config.go", "etc/webapp_config.json", "main.go", "version.go"], "fixing_code_end_loc": [54, 1, 49, 107, 1193, 5], "fixing_code_start_loc": [7, 1, 45, 106, 133, ... | 712 |
Determine whether the {function_name} code is vulnerable or not. | [
"import { isRegExp } from 'util';\nimport { generate } from 'escodegen';\nimport { parseScript } from 'esprima';\nimport { visit, namedTypes as n, builders as b } from 'ast-types';\nimport { Context, RunningScriptOptions } from 'vm';",
"import { VM } from 'vm2';",
"\n/**\n * Compiles sync JavaScript code into J... | [
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [142, 182], "buggy_code_start_loc": [6, 162], "filenames": ["src/index.ts", "test/test.ts"], "fixing_code_end_loc": [145, 199], "fixing_code_start_loc": [6, 162], "message": "This affects the package pac-resolver before 5.0.0. This can occur when used with untrusted input, due to unsafe PAC file ... | 713 |
Determine whether the {function_name} code is vulnerable or not. | [
"import { isRegExp } from 'util';\nimport { generate } from 'escodegen';\nimport { parseScript } from 'esprima';\nimport { visit, namedTypes as n, builders as b } from 'ast-types';\nimport { Context, RunningScriptOptions } from 'vm';",
"import { VM, VMScript } from 'vm2';",
"\n/**\n * Compiles sync JavaScript c... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [142, 182], "buggy_code_start_loc": [6, 162], "filenames": ["src/index.ts", "test/test.ts"], "fixing_code_end_loc": [145, 199], "fixing_code_start_loc": [6, 162], "message": "This affects the package pac-resolver before 5.0.0. This can occur when used with untrusted input, due to unsafe PAC file ... | 713 |
Determine whether the {function_name} code is vulnerable or not. | [
"import fs from 'fs';\nimport path from 'path';\nimport assert from 'assert';\nimport degenerator, { compile } from '../src';",
"describe('degenerator()', () => {\n\tit('should support \"async\" output functions', () => {\n\t\tfunction aPlusB(a: () => string, b: () => string): string {\n\t\t\treturn a() + b();\n\... | [
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [142, 182], "buggy_code_start_loc": [6, 162], "filenames": ["src/index.ts", "test/test.ts"], "fixing_code_end_loc": [145, 199], "fixing_code_start_loc": [6, 162], "message": "This affects the package pac-resolver before 5.0.0. This can occur when used with untrusted input, due to unsafe PAC file ... | 713 |
Determine whether the {function_name} code is vulnerable or not. | [
"import fs from 'fs';\nimport path from 'path';\nimport assert from 'assert';\nimport degenerator, { compile } from '../src';",
"describe('degenerator()', () => {\n\tit('should support \"async\" output functions', () => {\n\t\tfunction aPlusB(a: () => string, b: () => string): string {\n\t\t\treturn a() + b();\n\... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [142, 182], "buggy_code_start_loc": [6, 162], "filenames": ["src/index.ts", "test/test.ts"], "fixing_code_end_loc": [145, 199], "fixing_code_start_loc": [6, 162], "message": "This affects the package pac-resolver before 5.0.0. This can occur when used with untrusted input, due to unsafe PAC file ... | 713 |
Determine whether the {function_name} code is vulnerable or not. | [
"package org.openmrs.module.appointmentscheduling;",
"import org.openmrs.BaseOpenmrsData;\nimport org.openmrs.Patient;\nimport org.openmrs.Provider;",
"",
"\nimport java.util.Date;",
"/**\n * persisted object that reflects a request by a provider (or other user) for a scheduler to schedule a patient for a f... | [
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [99, 297], "buggy_code_start_loc": [5, 87], "filenames": ["api/src/main/java/org/openmrs/module/appointmentscheduling/AppointmentRequest.java", "api/src/test/java/org/openmrs/module/appointmentscheduling/api/AppointmentRequestServiceTest.java"], "fixing_code_end_loc": [100, 306], "fixing_code_sta... | 714 |
Determine whether the {function_name} code is vulnerable or not. | [
"package org.openmrs.module.appointmentscheduling;",
"import org.openmrs.BaseOpenmrsData;\nimport org.openmrs.Patient;\nimport org.openmrs.Provider;",
"import org.openmrs.web.WebUtil;",
"\nimport java.util.Date;",
"/**\n * persisted object that reflects a request by a provider (or other user) for a schedule... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [99, 297], "buggy_code_start_loc": [5, 87], "filenames": ["api/src/main/java/org/openmrs/module/appointmentscheduling/AppointmentRequest.java", "api/src/test/java/org/openmrs/module/appointmentscheduling/api/AppointmentRequestServiceTest.java"], "fixing_code_end_loc": [100, 306], "fixing_code_sta... | 714 |
Determine whether the {function_name} code is vulnerable or not. | [
"package org.openmrs.module.appointmentscheduling.api;",
"import org.junit.Before;\nimport org.junit.Test;\nimport org.openmrs.Patient;\nimport org.openmrs.Provider;\nimport org.openmrs.api.APIException;\nimport org.openmrs.api.LocationService;\nimport org.openmrs.api.PatientService;\nimport org.openmrs.api.Provi... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [99, 297], "buggy_code_start_loc": [5, 87], "filenames": ["api/src/main/java/org/openmrs/module/appointmentscheduling/AppointmentRequest.java", "api/src/test/java/org/openmrs/module/appointmentscheduling/api/AppointmentRequestServiceTest.java"], "fixing_code_end_loc": [100, 306], "fixing_code_sta... | 714 |
Determine whether the {function_name} code is vulnerable or not. | [
"package org.openmrs.module.appointmentscheduling.api;",
"import org.junit.Before;\nimport org.junit.Test;\nimport org.openmrs.Patient;\nimport org.openmrs.Provider;\nimport org.openmrs.api.APIException;\nimport org.openmrs.api.LocationService;\nimport org.openmrs.api.PatientService;\nimport org.openmrs.api.Provi... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [99, 297], "buggy_code_start_loc": [5, 87], "filenames": ["api/src/main/java/org/openmrs/module/appointmentscheduling/AppointmentRequest.java", "api/src/test/java/org/openmrs/module/appointmentscheduling/api/AppointmentRequestServiceTest.java"], "fixing_code_end_loc": [100, 306], "fixing_code_sta... | 714 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n *\t\t\tGPAC - Multimedia Framework C SDK\n *\n *\t\t\tAuthors: Jean Le Feuvre\n *\t\t\tCopyright (c) Telecom ParisTech 2000-2012\n *\t\t\t\t\tAll rights reserved\n *\n * This file is part of GPAC / Media Tools sub-project\n *\n * GPAC is free software; you can redistribute it and/or modify\n * it under the... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [407], "buggy_code_start_loc": [404], "filenames": ["src/media_tools/isom_hinter.c"], "fixing_code_end_loc": [407], "fixing_code_start_loc": [405], "message": "The gf_hinter_track_new function in GPAC 1.0.1 allows attackers to read memory via a crafted file in the MP4Box command.", "other": {"cve... | 715 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n *\t\t\tGPAC - Multimedia Framework C SDK\n *\n *\t\t\tAuthors: Jean Le Feuvre\n *\t\t\tCopyright (c) Telecom ParisTech 2000-2012\n *\t\t\t\t\tAll rights reserved\n *\n * This file is part of GPAC / Media Tools sub-project\n *\n * GPAC is free software; you can redistribute it and/or modify\n * it under the... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [407], "buggy_code_start_loc": [404], "filenames": ["src/media_tools/isom_hinter.c"], "fixing_code_end_loc": [407], "fixing_code_start_loc": [405], "message": "The gf_hinter_track_new function in GPAC 1.0.1 allows attackers to read memory via a crafted file in the MP4Box command.", "other": {"cve... | 715 |
Determine whether the {function_name} code is vulnerable or not. | [
"",
"2022-04-26: Fix text formatting\n2022-04-26: Fix array boundary check when parsing inflections which could result in buffer over-read with corrupt input\n2022-04-23: Fix formatting\n2022-04-23: Fix checking boundary of deobfuscation key which could cause buffer over-read with corrupt data\n2022-04-23: Fix is... | [
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [0, 988], "buggy_code_start_loc": [0, 964], "filenames": ["ChangeLog", "src/index.c"], "fixing_code_end_loc": [2, 984], "fixing_code_start_loc": [1, 963], "message": "Buffer Over-read in GitHub repository bfabiszewski/libmobi prior to 0.11. This vulnerability is capable of arbitrary code executio... | 716 |
Determine whether the {function_name} code is vulnerable or not. | [
"2022-04-27: Fix wrong boundary checks in inflections parser resulting in stack buffer over-read with corrupt input",
"2022-04-26: Fix text formatting\n2022-04-26: Fix array boundary check when parsing inflections which could result in buffer over-read with corrupt input\n2022-04-23: Fix formatting\n2022-04-23: F... | [
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [0, 988], "buggy_code_start_loc": [0, 964], "filenames": ["ChangeLog", "src/index.c"], "fixing_code_end_loc": [2, 984], "fixing_code_start_loc": [1, 963], "message": "Buffer Over-read in GitHub repository bfabiszewski/libmobi prior to 0.11. This vulnerability is capable of arbitrary code executio... | 716 |
Determine whether the {function_name} code is vulnerable or not. | [
"/** @file index.c\n * @brief Functions to parse index records\n *\n * Copyright (c) 2020 Bartek Fabiszewski\n * http://www.fabiszewski.net\n *\n * This file is part of libmobi.\n * Licensed under LGPL, either version 3, or any later.\n * See <http://www.gnu.org/licenses/>\n */",
"#define _GNU_SOURCE 1\n#ifndef ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
0,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [0, 988], "buggy_code_start_loc": [0, 964], "filenames": ["ChangeLog", "src/index.c"], "fixing_code_end_loc": [2, 984], "fixing_code_start_loc": [1, 963], "message": "Buffer Over-read in GitHub repository bfabiszewski/libmobi prior to 0.11. This vulnerability is capable of arbitrary code executio... | 716 |
Determine whether the {function_name} code is vulnerable or not. | [
"/** @file index.c\n * @brief Functions to parse index records\n *\n * Copyright (c) 2020 Bartek Fabiszewski\n * http://www.fabiszewski.net\n *\n * This file is part of libmobi.\n * Licensed under LGPL, either version 3, or any later.\n * See <http://www.gnu.org/licenses/>\n */",
"#define _GNU_SOURCE 1\n#ifndef ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [0, 988], "buggy_code_start_loc": [0, 964], "filenames": ["ChangeLog", "src/index.c"], "fixing_code_end_loc": [2, 984], "fixing_code_start_loc": [1, 963], "message": "Buffer Over-read in GitHub repository bfabiszewski/libmobi prior to 0.11. This vulnerability is capable of arbitrary code executio... | 716 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* vi:set ts=8 sts=4 sw=4 noet:\n *\n * VIM - Vi IMproved\tby Bram Moolenaar\n *\n * Do \":help uganda\" in Vim to read copying and usage conditions.\n * Do \":help credits\" in Vim to see a list of people who contributed.\n * See README.txt for an overview of the Vim source code.\n */",
"/*\n * getchar.c: Code... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [257, 738, 752], "buggy_code_start_loc": [255, 738, 752], "filenames": ["src/getchar.c", "src/testdir/test_registers.vim", "src/version.c"], "fixing_code_end_loc": [260, 748, 755], "fixing_code_start_loc": [255, 739, 753], "message": "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2."... | 717 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* vi:set ts=8 sts=4 sw=4 noet:\n *\n * VIM - Vi IMproved\tby Bram Moolenaar\n *\n * Do \":help uganda\" in Vim to read copying and usage conditions.\n * Do \":help credits\" in Vim to see a list of people who contributed.\n * See README.txt for an overview of the Vim source code.\n */",
"/*\n * getchar.c: Code... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [257, 738, 752], "buggy_code_start_loc": [255, 738, 752], "filenames": ["src/getchar.c", "src/testdir/test_registers.vim", "src/version.c"], "fixing_code_end_loc": [260, 748, 755], "fixing_code_start_loc": [255, 739, 753], "message": "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2."... | 717 |
Determine whether the {function_name} code is vulnerable or not. | [
"\" Tests for register operations",
"source check.vim\nsource view_util.vim",
"\" This test must be executed first to check for empty and unset registers.\nfunc Test_aaa_empty_reg_test()\n call assert_fails('normal @@', 'E748:')\n call assert_fails('normal @%', 'E354:')\n call assert_fails('normal @#', 'E354... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [257, 738, 752], "buggy_code_start_loc": [255, 738, 752], "filenames": ["src/getchar.c", "src/testdir/test_registers.vim", "src/version.c"], "fixing_code_end_loc": [260, 748, 755], "fixing_code_start_loc": [255, 739, 753], "message": "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2."... | 717 |
Determine whether the {function_name} code is vulnerable or not. | [
"\" Tests for register operations",
"source check.vim\nsource view_util.vim",
"\" This test must be executed first to check for empty and unset registers.\nfunc Test_aaa_empty_reg_test()\n call assert_fails('normal @@', 'E748:')\n call assert_fails('normal @%', 'E354:')\n call assert_fails('normal @#', 'E354... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [257, 738, 752], "buggy_code_start_loc": [255, 738, 752], "filenames": ["src/getchar.c", "src/testdir/test_registers.vim", "src/version.c"], "fixing_code_end_loc": [260, 748, 755], "fixing_code_start_loc": [255, 739, 753], "message": "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2."... | 717 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* vi:set ts=8 sts=4 sw=4 noet:\n *\n * VIM - Vi IMproved\t\tby Bram Moolenaar\n *\n * Do \":help uganda\" in Vim to read copying and usage conditions.\n * Do \":help credits\" in Vim to see a list of people who contributed.\n * See README.txt for an overview of the Vim source code.\n */",
"#include \"vim.h\"",... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [257, 738, 752], "buggy_code_start_loc": [255, 738, 752], "filenames": ["src/getchar.c", "src/testdir/test_registers.vim", "src/version.c"], "fixing_code_end_loc": [260, 748, 755], "fixing_code_start_loc": [255, 739, 753], "message": "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2."... | 717 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* vi:set ts=8 sts=4 sw=4 noet:\n *\n * VIM - Vi IMproved\t\tby Bram Moolenaar\n *\n * Do \":help uganda\" in Vim to read copying and usage conditions.\n * Do \":help credits\" in Vim to see a list of people who contributed.\n * See README.txt for an overview of the Vim source code.\n */",
"#include \"vim.h\"",... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [257, 738, 752], "buggy_code_start_loc": [255, 738, 752], "filenames": ["src/getchar.c", "src/testdir/test_registers.vim", "src/version.c"], "fixing_code_end_loc": [260, 748, 755], "fixing_code_start_loc": [255, 739, 753], "message": "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2."... | 717 |
Determine whether the {function_name} code is vulnerable or not. | [
"// SPDX-License-Identifier: GPL-2.0\n/*\n * linux/fs/ext4/inode.c\n *\n * Copyright (C) 1992, 1993, 1994, 1995\n * Remy Card (card@masi.ibp.fr)\n * Laboratoire MASI - Institut Blaise Pascal\n * Universite Pierre et Marie Curie (Paris VI)\n *\n * from\n *\n * linux/fs/minix/inode.c\n *\n * Copyright (C) 1991, 1... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [5572, 3570], "buggy_code_start_loc": [5571, 3548], "filenames": ["fs/ext4/inode.c", "fs/ext4/super.c"], "fixing_code_end_loc": [5588, 3573], "fixing_code_start_loc": [5572, 3548], "message": "The Linux kernel before 5.4.2 mishandles ext4_expand_extra_isize, as demonstrated by use-after-free erro... | 718 |
Determine whether the {function_name} code is vulnerable or not. | [
"// SPDX-License-Identifier: GPL-2.0\n/*\n * linux/fs/ext4/inode.c\n *\n * Copyright (C) 1992, 1993, 1994, 1995\n * Remy Card (card@masi.ibp.fr)\n * Laboratoire MASI - Institut Blaise Pascal\n * Universite Pierre et Marie Curie (Paris VI)\n *\n * from\n *\n * linux/fs/minix/inode.c\n *\n * Copyright (C) 1991, 1... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [5572, 3570], "buggy_code_start_loc": [5571, 3548], "filenames": ["fs/ext4/inode.c", "fs/ext4/super.c"], "fixing_code_end_loc": [5588, 3573], "fixing_code_start_loc": [5572, 3548], "message": "The Linux kernel before 5.4.2 mishandles ext4_expand_extra_isize, as demonstrated by use-after-free erro... | 718 |
Determine whether the {function_name} code is vulnerable or not. | [
"// SPDX-License-Identifier: GPL-2.0\n/*\n * linux/fs/ext4/super.c\n *\n * Copyright (C) 1992, 1993, 1994, 1995\n * Remy Card (card@masi.ibp.fr)\n * Laboratoire MASI - Institut Blaise Pascal\n * Universite Pierre et Marie Curie (Paris VI)\n *\n * from\n *\n * linux/fs/minix/inode.c\n *\n * Copyright (C) 1991, 1... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [5572, 3570], "buggy_code_start_loc": [5571, 3548], "filenames": ["fs/ext4/inode.c", "fs/ext4/super.c"], "fixing_code_end_loc": [5588, 3573], "fixing_code_start_loc": [5572, 3548], "message": "The Linux kernel before 5.4.2 mishandles ext4_expand_extra_isize, as demonstrated by use-after-free erro... | 718 |
Determine whether the {function_name} code is vulnerable or not. | [
"// SPDX-License-Identifier: GPL-2.0\n/*\n * linux/fs/ext4/super.c\n *\n * Copyright (C) 1992, 1993, 1994, 1995\n * Remy Card (card@masi.ibp.fr)\n * Laboratoire MASI - Institut Blaise Pascal\n * Universite Pierre et Marie Curie (Paris VI)\n *\n * from\n *\n * linux/fs/minix/inode.c\n *\n * Copyright (C) 1991, 1... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [5572, 3570], "buggy_code_start_loc": [5571, 3548], "filenames": ["fs/ext4/inode.c", "fs/ext4/super.c"], "fixing_code_end_loc": [5588, 3573], "fixing_code_start_loc": [5572, 3548], "message": "The Linux kernel before 5.4.2 mishandles ext4_expand_extra_isize, as demonstrated by use-after-free erro... | 718 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%\n% %\n% %\n% ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [4595], "buggy_code_start_loc": [4594], "filenames": ["coders/png.c"], "fixing_code_end_loc": [4595], "fixing_code_start_loc": [4594], "message": "In ImageMagick 7.0.7-29 and earlier, a missing NULL check in ReadOneJNGImage in coders/png.c allows an attacker to cause a denial of service (WriteBlo... | 719 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%\n% %\n% %\n% ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [4595], "buggy_code_start_loc": [4594], "filenames": ["coders/png.c"], "fixing_code_end_loc": [4595], "fixing_code_start_loc": [4594], "message": "In ImageMagick 7.0.7-29 and earlier, a missing NULL check in ReadOneJNGImage in coders/png.c allows an attacker to cause a denial of service (WriteBlo... | 719 |
Determine whether the {function_name} code is vulnerable or not. | [
"import * as Utils from './utils';\nimport Exception from './exception';\nimport {\n COMPILER_REVISION,\n createFrame,\n LAST_COMPATIBLE_COMPILER_REVISION,\n REVISION_CHANGES\n} from './base';\nimport { moveHelperToHooks } from './helpers';\nimport { wrapHelper } from './internal/wrapHelper';\nimport {\n creat... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [128, 300], "buggy_code_start_loc": [127, 300], "filenames": ["lib/handlebars/runtime.js", "spec/security.js"], "fixing_code_end_loc": [128, 305], "fixing_code_start_loc": [127, 301], "message": "The package handlebars before 4.7.7 are vulnerable to Remote Code Execution (RCE) when selecting cert... | 720 |
Determine whether the {function_name} code is vulnerable or not. | [
"import * as Utils from './utils';\nimport Exception from './exception';\nimport {\n COMPILER_REVISION,\n createFrame,\n LAST_COMPATIBLE_COMPILER_REVISION,\n REVISION_CHANGES\n} from './base';\nimport { moveHelperToHooks } from './helpers';\nimport { wrapHelper } from './internal/wrapHelper';\nimport {\n creat... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [128, 300], "buggy_code_start_loc": [127, 300], "filenames": ["lib/handlebars/runtime.js", "spec/security.js"], "fixing_code_end_loc": [128, 305], "fixing_code_start_loc": [127, 301], "message": "The package handlebars before 4.7.7 are vulnerable to Remote Code Execution (RCE) when selecting cert... | 720 |
Determine whether the {function_name} code is vulnerable or not. | [
"describe('security issues', function() {\n describe('GH-1495: Prevent Remote Code Execution via constructor', function() {\n it('should not allow constructors to be accessed', function() {\n expectTemplate('{{lookup (lookup this \"constructor\") \"name\"}}')\n .withInput({})\n .toCompileTo('... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [128, 300], "buggy_code_start_loc": [127, 300], "filenames": ["lib/handlebars/runtime.js", "spec/security.js"], "fixing_code_end_loc": [128, 305], "fixing_code_start_loc": [127, 301], "message": "The package handlebars before 4.7.7 are vulnerable to Remote Code Execution (RCE) when selecting cert... | 720 |
Determine whether the {function_name} code is vulnerable or not. | [
"describe('security issues', function() {\n describe('GH-1495: Prevent Remote Code Execution via constructor', function() {\n it('should not allow constructors to be accessed', function() {\n expectTemplate('{{lookup (lookup this \"constructor\") \"name\"}}')\n .withInput({})\n .toCompileTo('... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [128, 300], "buggy_code_start_loc": [127, 300], "filenames": ["lib/handlebars/runtime.js", "spec/security.js"], "fixing_code_end_loc": [128, 305], "fixing_code_start_loc": [127, 301], "message": "The package handlebars before 4.7.7 are vulnerable to Remote Code Execution (RCE) when selecting cert... | 720 |
Determine whether the {function_name} code is vulnerable or not. | [
"<table class=\"index adjustments\" data-hook=\"adjustments\">\n <thead data-hook=\"adjustmment_head\">\n <tr>\n <th><%= Spree::Adjustment.human_attribute_name(:adjustable) %></th>\n <th><%= Spree::Adjustment.human_attribute_name(:label) %></th>\n <th><%= Spree::Adjustment.human_attribute_name(:a... | [
1,
0,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [22, 95, 113], "buggy_code_start_loc": [16, 80, 113], "filenames": ["backend/app/views/spree/admin/adjustments/_adjustments_table.html.erb", "backend/config/routes.rb", "backend/spec/features/admin/orders/adjustments_spec.rb"], "fixing_code_end_loc": [22, 95, 152], "fixing_code_start_loc": [16, 8... | 721 |
Determine whether the {function_name} code is vulnerable or not. | [
"<table class=\"index adjustments\" data-hook=\"adjustments\">\n <thead data-hook=\"adjustmment_head\">\n <tr>\n <th><%= Spree::Adjustment.human_attribute_name(:adjustable) %></th>\n <th><%= Spree::Adjustment.human_attribute_name(:label) %></th>\n <th><%= Spree::Adjustment.human_attribute_name(:a... | [
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [22, 95, 113], "buggy_code_start_loc": [16, 80, 113], "filenames": ["backend/app/views/spree/admin/adjustments/_adjustments_table.html.erb", "backend/config/routes.rb", "backend/spec/features/admin/orders/adjustments_spec.rb"], "fixing_code_end_loc": [22, 95, 152], "fixing_code_start_loc": [16, 8... | 721 |
Determine whether the {function_name} code is vulnerable or not. | [
"# frozen_string_literal: true",
"Spree::Core::Engine.routes.draw do\n namespace :admin do\n get '/search/users', to: \"search#users\", as: :search_users\n get '/search/products', to: \"search#products\", as: :search_products",
" put '/locale/set', to: 'locale#set', defaults: { format: :json }, as: :s... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [22, 95, 113], "buggy_code_start_loc": [16, 80, 113], "filenames": ["backend/app/views/spree/admin/adjustments/_adjustments_table.html.erb", "backend/config/routes.rb", "backend/spec/features/admin/orders/adjustments_spec.rb"], "fixing_code_end_loc": [22, 95, 152], "fixing_code_start_loc": [16, 8... | 721 |
Determine whether the {function_name} code is vulnerable or not. | [
"# frozen_string_literal: true",
"Spree::Core::Engine.routes.draw do\n namespace :admin do\n get '/search/users', to: \"search#users\", as: :search_users\n get '/search/products', to: \"search#products\", as: :search_products",
" put '/locale/set', to: 'locale#set', defaults: { format: :json }, as: :s... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [22, 95, 113], "buggy_code_start_loc": [16, 80, 113], "filenames": ["backend/app/views/spree/admin/adjustments/_adjustments_table.html.erb", "backend/config/routes.rb", "backend/spec/features/admin/orders/adjustments_spec.rb"], "fixing_code_end_loc": [22, 95, 152], "fixing_code_start_loc": [16, 8... | 721 |
Determine whether the {function_name} code is vulnerable or not. | [
"# frozen_string_literal: true",
"require 'spec_helper'",
"describe \"Adjustments\", type: :feature do\n stub_authorization!",
" context \"when the order is completed\" do\n let!(:ship_address) { create(:address) }\n let!(:tax_zone) { create(:global_zone) } # will include the above address\n let!(:... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [22, 95, 113], "buggy_code_start_loc": [16, 80, 113], "filenames": ["backend/app/views/spree/admin/adjustments/_adjustments_table.html.erb", "backend/config/routes.rb", "backend/spec/features/admin/orders/adjustments_spec.rb"], "fixing_code_end_loc": [22, 95, 152], "fixing_code_start_loc": [16, 8... | 721 |
Determine whether the {function_name} code is vulnerable or not. | [
"# frozen_string_literal: true",
"require 'spec_helper'",
"describe \"Adjustments\", type: :feature do\n stub_authorization!",
" context \"when the order is completed\" do\n let!(:ship_address) { create(:address) }\n let!(:tax_zone) { create(:global_zone) } # will include the above address\n let!(:... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [22, 95, 113], "buggy_code_start_loc": [16, 80, 113], "filenames": ["backend/app/views/spree/admin/adjustments/_adjustments_table.html.erb", "backend/config/routes.rb", "backend/spec/features/admin/orders/adjustments_spec.rb"], "fixing_code_end_loc": [22, 95, 152], "fixing_code_start_loc": [16, 8... | 721 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* vi:set et sw=2 sts=2 cin cino=t0,f0,(0,{s,>2s,n-s,^-s,e-s:\n * Copyright © 2014-2019 Red Hat, Inc\n *\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU Lesser General Public\n * License as published by the Free Software Foundation; either\n * version 2.1 ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [3222, 82, 153], "buggy_code_start_loc": [3222, 11, 153], "filenames": ["common/flatpak-run.c", "tests/test-seccomp.sh", "tests/try-syscall.c"], "fixing_code_end_loc": [3227, 89, 163], "fixing_code_start_loc": [3223, 11, 154], "message": "Flatpak is a system for building, distributing, and runnin... | 722 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* vi:set et sw=2 sts=2 cin cino=t0,f0,(0,{s,>2s,n-s,^-s,e-s:\n * Copyright © 2014-2019 Red Hat, Inc\n *\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU Lesser General Public\n * License as published by the Free Software Foundation; either\n * version 2.1 ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [3222, 82, 153], "buggy_code_start_loc": [3222, 11, 153], "filenames": ["common/flatpak-run.c", "tests/test-seccomp.sh", "tests/try-syscall.c"], "fixing_code_end_loc": [3227, 89, 163], "fixing_code_start_loc": [3223, 11, 154], "message": "Flatpak is a system for building, distributing, and runnin... | 722 |
Determine whether the {function_name} code is vulnerable or not. | [
"#!/bin/bash\n# Copyright 2021 Collabora Ltd.\n# SPDX-License-Identifier: LGPL-2.0-or-later",
"set -euo pipefail",
". $(dirname $0)/libtest.sh",
"skip_without_bwrap\n",
"echo \"1..16\"",
"\nsetup_repo\ninstall_repo",
"cp -a \"$G_TEST_BUILDDIR/try-syscall\" \"$test_tmpdir/try-syscall\"",
"# How this wo... | [
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [3222, 82, 153], "buggy_code_start_loc": [3222, 11, 153], "filenames": ["common/flatpak-run.c", "tests/test-seccomp.sh", "tests/try-syscall.c"], "fixing_code_end_loc": [3227, 89, 163], "fixing_code_start_loc": [3223, 11, 154], "message": "Flatpak is a system for building, distributing, and runnin... | 722 |
Determine whether the {function_name} code is vulnerable or not. | [
"#!/bin/bash\n# Copyright 2021 Collabora Ltd.\n# SPDX-License-Identifier: LGPL-2.0-or-later",
"set -euo pipefail",
". $(dirname $0)/libtest.sh",
"skip_without_bwrap\n",
"echo \"1..18\"",
"\nsetup_repo\ninstall_repo",
"cp -a \"$G_TEST_BUILDDIR/try-syscall\" \"$test_tmpdir/try-syscall\"",
"# How this wo... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [3222, 82, 153], "buggy_code_start_loc": [3222, 11, 153], "filenames": ["common/flatpak-run.c", "tests/test-seccomp.sh", "tests/try-syscall.c"], "fixing_code_end_loc": [3227, 89, 163], "fixing_code_start_loc": [3223, 11, 154], "message": "Flatpak is a system for building, distributing, and runnin... | 722 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* vi:set et sw=2 sts=2 cin cino=t0,f0,(0,{s,>2s,n-s,^-s,e-s:\n * Copyright 2021 Simon McVittie\n * SPDX-License-Identifier: LGPL-2.0-or-later\n *\n * Try one or more system calls that might have been blocked by a\n * seccomp filter. Return the last value of errno seen.\n *\n * In general, we pass a bad fd or poin... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [3222, 82, 153], "buggy_code_start_loc": [3222, 11, 153], "filenames": ["common/flatpak-run.c", "tests/test-seccomp.sh", "tests/try-syscall.c"], "fixing_code_end_loc": [3227, 89, 163], "fixing_code_start_loc": [3223, 11, 154], "message": "Flatpak is a system for building, distributing, and runnin... | 722 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* vi:set et sw=2 sts=2 cin cino=t0,f0,(0,{s,>2s,n-s,^-s,e-s:\n * Copyright 2021 Simon McVittie\n * SPDX-License-Identifier: LGPL-2.0-or-later\n *\n * Try one or more system calls that might have been blocked by a\n * seccomp filter. Return the last value of errno seen.\n *\n * In general, we pass a bad fd or poin... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [3222, 82, 153], "buggy_code_start_loc": [3222, 11, 153], "filenames": ["common/flatpak-run.c", "tests/test-seccomp.sh", "tests/try-syscall.c"], "fixing_code_end_loc": [3227, 89, 163], "fixing_code_start_loc": [3223, 11, 154], "message": "Flatpak is a system for building, distributing, and runnin... | 722 |
Determine whether the {function_name} code is vulnerable or not. | [
"# Changelog",
"",
"\n## v0.13",
"### Bug Fixes",
"- Fix `slice` support by making it a configurable option",
"## v0.12",
"### New Features",
"- Allow setting which **Systemd Slice** users' services should belong to.\n This lets admins set policy for all JupyterHub users in one go.\n [Thanks to [@ma... | [
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [1, 6, 55, 85], "buggy_code_start_loc": [1, 5, 6, 68], "filenames": ["CHANGELOG.md", "setup.py", "systemdspawner/systemd.py", "tests/test_systemd.py"], "fixing_code_end_loc": [13, 6, 127, 104], "fixing_code_start_loc": [2, 5, 7, 68], "message": "jupyterhub-systemdspawner enables JupyterHub to spa... | 723 |
Determine whether the {function_name} code is vulnerable or not. | [
"# Changelog",
"\n## v0.15",
"Fixes vulnerability [GHSA-cg54-gpgr-4rm6](https://github.com/jupyterhub/systemdspawner/security/advisories/GHSA-cg54-gpgr-4rm6) affecting all previous releases.",
"- Use EnvironmentFile to pass environment variables to units.",
"## v0.14",
"- define entrypoints for JupyterHub... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [1, 6, 55, 85], "buggy_code_start_loc": [1, 5, 6, 68], "filenames": ["CHANGELOG.md", "setup.py", "systemdspawner/systemd.py", "tests/test_systemd.py"], "fixing_code_end_loc": [13, 6, 127, 104], "fixing_code_start_loc": [2, 5, 7, 68], "message": "jupyterhub-systemdspawner enables JupyterHub to spa... | 723 |
Determine whether the {function_name} code is vulnerable or not. | [
"from setuptools import setup",
"setup(\n name='jupyterhub-systemdspawner',",
" version='0.14',",
" description='JupyterHub Spawner using systemd for resource isolation',\n long_description='See https://github.com/jupyterhub/systemdspawner for more info',\n url='https://github.com/jupyterhub/sy... | [
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [1, 6, 55, 85], "buggy_code_start_loc": [1, 5, 6, 68], "filenames": ["CHANGELOG.md", "setup.py", "systemdspawner/systemd.py", "tests/test_systemd.py"], "fixing_code_end_loc": [13, 6, 127, 104], "fixing_code_start_loc": [2, 5, 7, 68], "message": "jupyterhub-systemdspawner enables JupyterHub to spa... | 723 |
Determine whether the {function_name} code is vulnerable or not. | [
"from setuptools import setup",
"setup(\n name='jupyterhub-systemdspawner',",
" version='0.15.0',",
" description='JupyterHub Spawner using systemd for resource isolation',\n long_description='See https://github.com/jupyterhub/systemdspawner for more info',\n url='https://github.com/jupyterhub/... | [
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [1, 6, 55, 85], "buggy_code_start_loc": [1, 5, 6, 68], "filenames": ["CHANGELOG.md", "setup.py", "systemdspawner/systemd.py", "tests/test_systemd.py"], "fixing_code_end_loc": [13, 6, 127, 104], "fixing_code_start_loc": [2, 5, 7, 68], "message": "jupyterhub-systemdspawner enables JupyterHub to spa... | 723 |
Determine whether the {function_name} code is vulnerable or not. | [
"\"\"\"\nSystemd service utilities.",
"Contains functions to start, stop & poll systemd services.\nProbably not very useful outside this spawner.\n\"\"\"",
"",
"import asyncio",
"",
"import shlex",
"",
"",
"async def start_transient_service(\n unit_name,\n cmd,\n args,\n working_dir,\n ... | [
1,
1,
0,
1,
0,
1,
0,
1,
1,
0,
1,
1,
0,
1,
1,
0,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [1, 6, 55, 85], "buggy_code_start_loc": [1, 5, 6, 68], "filenames": ["CHANGELOG.md", "setup.py", "systemdspawner/systemd.py", "tests/test_systemd.py"], "fixing_code_end_loc": [13, 6, 127, 104], "fixing_code_start_loc": [2, 5, 7, 68], "message": "jupyterhub-systemdspawner enables JupyterHub to spa... | 723 |
Determine whether the {function_name} code is vulnerable or not. | [
"\"\"\"\nSystemd service utilities.",
"Contains functions to start, stop & poll systemd services.\nProbably not very useful outside this spawner.\n\"\"\"",
"",
"import asyncio",
"import os\nimport re",
"import shlex",
"import warnings",
"# light validation of environment variable keys\nenv_pat = re.co... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [1, 6, 55, 85], "buggy_code_start_loc": [1, 5, 6, 68], "filenames": ["CHANGELOG.md", "setup.py", "systemdspawner/systemd.py", "tests/test_systemd.py"], "fixing_code_end_loc": [13, 6, 127, 104], "fixing_code_start_loc": [2, 5, 7, 68], "message": "jupyterhub-systemdspawner enables JupyterHub to spa... | 723 |
Determine whether the {function_name} code is vulnerable or not. | [
"\"\"\"\nTest systemd wrapper utilities.",
"Must run as root.\n\"\"\"\nimport tempfile\nfrom systemdspawner import systemd\nimport pytest\nimport asyncio\nimport os\nimport time",
"\n@pytest.mark.asyncio\nasync def test_simple_start():\n unit_name = 'systemdspawner-unittest-' + str(time.time())\n await sy... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [1, 6, 55, 85], "buggy_code_start_loc": [1, 5, 6, 68], "filenames": ["CHANGELOG.md", "setup.py", "systemdspawner/systemd.py", "tests/test_systemd.py"], "fixing_code_end_loc": [13, 6, 127, 104], "fixing_code_start_loc": [2, 5, 7, 68], "message": "jupyterhub-systemdspawner enables JupyterHub to spa... | 723 |
Determine whether the {function_name} code is vulnerable or not. | [
"\"\"\"\nTest systemd wrapper utilities.",
"Must run as root.\n\"\"\"\nimport tempfile\nfrom systemdspawner import systemd\nimport pytest\nimport asyncio\nimport os\nimport time",
"\n@pytest.mark.asyncio\nasync def test_simple_start():\n unit_name = 'systemdspawner-unittest-' + str(time.time())\n await sy... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [1, 6, 55, 85], "buggy_code_start_loc": [1, 5, 6, 68], "filenames": ["CHANGELOG.md", "setup.py", "systemdspawner/systemd.py", "tests/test_systemd.py"], "fixing_code_end_loc": [13, 6, 127, 104], "fixing_code_start_loc": [2, 5, 7, 68], "message": "jupyterhub-systemdspawner enables JupyterHub to spa... | 723 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/*\n* Bitstorm 2 - A small and fast Bittorrent tracker\n* Copyright 2011 Peter Caprioli\n*\n* This program is free software: you can redistribute it and/or modify\n* it under the terms of the GNU General Public License as published by\n* the Free Software Foundation, either version 3 of the License, or\n* (... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [117], "buggy_code_start_loc": [111], "filenames": ["announce.php"], "fixing_code_end_loc": [117], "fixing_code_start_loc": [111], "message": "A vulnerability classified as critical was found in ananich bitstorm. Affected by this vulnerability is an unknown functionality of the file announce.php.... | 724 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/*\n* Bitstorm 2 - A small and fast Bittorrent tracker\n* Copyright 2011 Peter Caprioli\n*\n* This program is free software: you can redistribute it and/or modify\n* it under the terms of the GNU General Public License as published by\n* the Free Software Foundation, either version 3 of the License, or\n* (... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [117], "buggy_code_start_loc": [111], "filenames": ["announce.php"], "fixing_code_end_loc": [117], "fixing_code_start_loc": [111], "message": "A vulnerability classified as critical was found in ananich bitstorm. Affected by this vulnerability is an unknown functionality of the file announce.php.... | 724 |
Determine whether the {function_name} code is vulnerable or not. | [
"Version 1.0.47 (unreleased)\n---------------------------",
"New features:",
"* Vietnamese translation",
"",
"\nVersion 1.0.46 (August 13, 2017)\n--------------------------------",
"Security Issues:",
"* Fix two privilege escalation issues: a standard user could reset the password \nof another user (inc... | [
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [6, 69, 111, 157, 162, 186, 155, 67, 127, 208, 51, 7, 9, 9, 7, 10, 8, 10, 7, 11, 13, 7, 8, 8, 11, 7], "buggy_code_start_loc": [6, 48, 37, 157, 15, 63, 61, 67, 4, 6, 51, 6, 8, 8, 6, 7, 6, 7, 6, 8, 12, 6, 6, 5, 6, 6], "filenames": ["ChangeLog", "app/Controller/ActionController.php", "app/Controller... | 725 |
Determine whether the {function_name} code is vulnerable or not. | [
"Version 1.0.47 (unreleased)\n---------------------------",
"New features:",
"* Vietnamese translation",
"\nSecurity Issues:",
"* Avoid people to alter other project resources by changing form data",
"\nVersion 1.0.46 (August 13, 2017)\n--------------------------------",
"Security Issues:",
"* Fix two... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [6, 69, 111, 157, 162, 186, 155, 67, 127, 208, 51, 7, 9, 9, 7, 10, 8, 10, 7, 11, 13, 7, 8, 8, 11, 7], "buggy_code_start_loc": [6, 48, 37, 157, 15, 63, 61, 67, 4, 6, 51, 6, 8, 8, 6, 7, 6, 7, 6, 8, 12, 6, 6, 5, 6, 6], "filenames": ["ChangeLog", "app/Controller/ActionController.php", "app/Controller... | 725 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"namespace Kanboard\\Controller;",
"/**\n * Automatic Actions Controller\n *\n * @package Kanboard\\Controller\n * @author Frederic Guillot\n */\nclass ActionController extends BaseController\n{\n /**\n * List of automatic actions for a given project\n *\n * @access public\n */\n ... | [
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
0,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [6, 69, 111, 157, 162, 186, 155, 67, 127, 208, 51, 7, 9, 9, 7, 10, 8, 10, 7, 11, 13, 7, 8, 8, 11, 7], "buggy_code_start_loc": [6, 48, 37, 157, 15, 63, 61, 67, 4, 6, 51, 6, 8, 8, 6, 7, 6, 7, 6, 8, 12, 6, 6, 5, 6, 6], "filenames": ["ChangeLog", "app/Controller/ActionController.php", "app/Controller... | 725 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"namespace Kanboard\\Controller;",
"/**\n * Automatic Actions Controller\n *\n * @package Kanboard\\Controller\n * @author Frederic Guillot\n */\nclass ActionController extends BaseController\n{\n /**\n * List of automatic actions for a given project\n *\n * @access public\n */\n ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [6, 69, 111, 157, 162, 186, 155, 67, 127, 208, 51, 7, 9, 9, 7, 10, 8, 10, 7, 11, 13, 7, 8, 8, 11, 7], "buggy_code_start_loc": [6, 48, 37, 157, 15, 63, 61, 67, 4, 6, 51, 6, 8, 8, 6, 7, 6, 7, 6, 8, 12, 6, 6, 5, 6, 6], "filenames": ["ChangeLog", "app/Controller/ActionController.php", "app/Controller... | 725 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"namespace Kanboard\\Controller;",
"/**\n * Action Creation Controller\n *\n * @package Kanboard\\Controller\n * @author Frederic Guillot\n */\nclass ActionCreationController extends BaseController\n{\n /**\n * Show the form (step 1)\n *\n * @access public\n */\n public function ... | [
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [6, 69, 111, 157, 162, 186, 155, 67, 127, 208, 51, 7, 9, 9, 7, 10, 8, 10, 7, 11, 13, 7, 8, 8, 11, 7], "buggy_code_start_loc": [6, 48, 37, 157, 15, 63, 61, 67, 4, 6, 51, 6, 8, 8, 6, 7, 6, 7, 6, 8, 12, 6, 6, 5, 6, 6], "filenames": ["ChangeLog", "app/Controller/ActionController.php", "app/Controller... | 725 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"namespace Kanboard\\Controller;",
"/**\n * Action Creation Controller\n *\n * @package Kanboard\\Controller\n * @author Frederic Guillot\n */\nclass ActionCreationController extends BaseController\n{\n /**\n * Show the form (step 1)\n *\n * @access public\n */\n public function ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [6, 69, 111, 157, 162, 186, 155, 67, 127, 208, 51, 7, 9, 9, 7, 10, 8, 10, 7, 11, 13, 7, 8, 8, 11, 7], "buggy_code_start_loc": [6, 48, 37, 157, 15, 63, 61, 67, 4, 6, 51, 6, 8, 8, 6, 7, 6, 7, 6, 8, 12, 6, 6, 5, 6, 6], "filenames": ["ChangeLog", "app/Controller/ActionController.php", "app/Controller... | 725 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"namespace Kanboard\\Controller;",
"use Kanboard\\Core\\Base;\nuse Kanboard\\Core\\Controller\\AccessForbiddenException;\nuse Kanboard\\Core\\Controller\\PageNotFoundException;",
"/**\n * Base Controller\n *\n * @package Kanboard\\Controller\n * @author Frederic Guillot\n */\nabstract class BaseCo... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [6, 69, 111, 157, 162, 186, 155, 67, 127, 208, 51, 7, 9, 9, 7, 10, 8, 10, 7, 11, 13, 7, 8, 8, 11, 7], "buggy_code_start_loc": [6, 48, 37, 157, 15, 63, 61, 67, 4, 6, 51, 6, 8, 8, 6, 7, 6, 7, 6, 8, 12, 6, 6, 5, 6, 6], "filenames": ["ChangeLog", "app/Controller/ActionController.php", "app/Controller... | 725 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"namespace Kanboard\\Controller;",
"use Kanboard\\Core\\Base;\nuse Kanboard\\Core\\Controller\\AccessForbiddenException;\nuse Kanboard\\Core\\Controller\\PageNotFoundException;",
"/**\n * Base Controller\n *\n * @package Kanboard\\Controller\n * @author Frederic Guillot\n */\nabstract class BaseCo... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [6, 69, 111, 157, 162, 186, 155, 67, 127, 208, 51, 7, 9, 9, 7, 10, 8, 10, 7, 11, 13, 7, 8, 8, 11, 7], "buggy_code_start_loc": [6, 48, 37, 157, 15, 63, 61, 67, 4, 6, 51, 6, 8, 8, 6, 7, 6, 7, 6, 8, 12, 6, 6, 5, 6, 6], "filenames": ["ChangeLog", "app/Controller/ActionController.php", "app/Controller... | 725 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"namespace Kanboard\\Controller;",
"use Kanboard\\Core\\Controller\\PageNotFoundException;",
"/**\n * Category Controller\n *\n * @package Kanboard\\Controller\n * @author Frederic Guillot\n */\nclass CategoryController extends BaseController\n{",
" /**\n * Get the category (common method b... | [
1,
1,
1,
1,
0,
0,
0,
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
0,
1,
1,
0,
1,
0,
1,
1,
1,
1,
0,
1,
1,
0,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [6, 69, 111, 157, 162, 186, 155, 67, 127, 208, 51, 7, 9, 9, 7, 10, 8, 10, 7, 11, 13, 7, 8, 8, 11, 7], "buggy_code_start_loc": [6, 48, 37, 157, 15, 63, 61, 67, 4, 6, 51, 6, 8, 8, 6, 7, 6, 7, 6, 8, 12, 6, 6, 5, 6, 6], "filenames": ["ChangeLog", "app/Controller/ActionController.php", "app/Controller... | 725 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"namespace Kanboard\\Controller;",
"use Kanboard\\Core\\Controller\\PageNotFoundException;",
"/**\n * Category Controller\n *\n * @package Kanboard\\Controller\n * @author Frederic Guillot\n */\nclass CategoryController extends BaseController\n{",
"",
" /**\n * List of categories for a gi... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [6, 69, 111, 157, 162, 186, 155, 67, 127, 208, 51, 7, 9, 9, 7, 10, 8, 10, 7, 11, 13, 7, 8, 8, 11, 7], "buggy_code_start_loc": [6, 48, 37, 157, 15, 63, 61, 67, 4, 6, 51, 6, 8, 8, 6, 7, 6, 7, 6, 8, 12, 6, 6, 5, 6, 6], "filenames": ["ChangeLog", "app/Controller/ActionController.php", "app/Controller... | 725 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"namespace Kanboard\\Controller;",
"use Kanboard\\Core\\Controller\\AccessForbiddenException;",
"/**\n * Column Controller\n *\n * @package Kanboard\\Controller\n * @author Frederic Guillot\n */\nclass ColumnController extends BaseController\n{\n /**\n * Display columns list\n *\n *... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
0,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
0,
1,
0,
1,
0,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [6, 69, 111, 157, 162, 186, 155, 67, 127, 208, 51, 7, 9, 9, 7, 10, 8, 10, 7, 11, 13, 7, 8, 8, 11, 7], "buggy_code_start_loc": [6, 48, 37, 157, 15, 63, 61, 67, 4, 6, 51, 6, 8, 8, 6, 7, 6, 7, 6, 8, 12, 6, 6, 5, 6, 6], "filenames": ["ChangeLog", "app/Controller/ActionController.php", "app/Controller... | 725 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"namespace Kanboard\\Controller;",
"use Kanboard\\Core\\Controller\\AccessForbiddenException;",
"/**\n * Column Controller\n *\n * @package Kanboard\\Controller\n * @author Frederic Guillot\n */\nclass ColumnController extends BaseController\n{\n /**\n * Display columns list\n *\n *... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [6, 69, 111, 157, 162, 186, 155, 67, 127, 208, 51, 7, 9, 9, 7, 10, 8, 10, 7, 11, 13, 7, 8, 8, 11, 7], "buggy_code_start_loc": [6, 48, 37, 157, 15, 63, 61, 67, 4, 6, 51, 6, 8, 8, 6, 7, 6, 7, 6, 8, 12, 6, 6, 5, 6, 6], "filenames": ["ChangeLog", "app/Controller/ActionController.php", "app/Controller... | 725 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"namespace Kanboard\\Controller;",
"use Kanboard\\Core\\Controller\\AccessForbiddenException;\nuse Kanboard\\Core\\Security\\Role;",
"/**\n * Custom Filter Controller\n *\n * @package Kanboard\\Controller\n * @author Timo Litzbarski\n * @author Frederic Guillot\n */\nclass CustomFilterController ex... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
0,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [6, 69, 111, 157, 162, 186, 155, 67, 127, 208, 51, 7, 9, 9, 7, 10, 8, 10, 7, 11, 13, 7, 8, 8, 11, 7], "buggy_code_start_loc": [6, 48, 37, 157, 15, 63, 61, 67, 4, 6, 51, 6, 8, 8, 6, 7, 6, 7, 6, 8, 12, 6, 6, 5, 6, 6], "filenames": ["ChangeLog", "app/Controller/ActionController.php", "app/Controller... | 725 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"namespace Kanboard\\Controller;",
"use Kanboard\\Core\\Controller\\AccessForbiddenException;\nuse Kanboard\\Core\\Security\\Role;",
"/**\n * Custom Filter Controller\n *\n * @package Kanboard\\Controller\n * @author Timo Litzbarski\n * @author Frederic Guillot\n */\nclass CustomFilterController ex... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [6, 69, 111, 157, 162, 186, 155, 67, 127, 208, 51, 7, 9, 9, 7, 10, 8, 10, 7, 11, 13, 7, 8, 8, 11, 7], "buggy_code_start_loc": [6, 48, 37, 157, 15, 63, 61, 67, 4, 6, 51, 6, 8, 8, 6, 7, 6, 7, 6, 8, 12, 6, 6, 5, 6, 6], "filenames": ["ChangeLog", "app/Controller/ActionController.php", "app/Controller... | 725 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.